🔥 Trending CVEs - Last 90 Days

4,449 critical and high-severity vulnerabilities discovered in the last 90 days. Stay ahead of emerging threats with real-time CVE tracking and instant security alerts.

Last 7 Days Last 30 Days Last 90 Days
11,147
Total CVEs Published
978
Critical Severity
3,471
High Severity
⚠️
Critical Alert
978 critical vulnerabilities published in the last 90 days. Immediate action recommended.
Get Alerts

Critical & High-Risk CVEs

CVE-2025-69058 8.1

This vulnerability allows attackers to include local PHP files through improper filename control in the PartyMaker WordPress theme. Attackers can pote...

📅 48 days ago • Jan 22, 2026
CVE-2025-69059 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the DiveIt WordPress theme that allows attackers to include arbitrary local files via i...

📅 48 days ago • Jan 22, 2026
CVE-2025-69060 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 48 days ago • Jan 22, 2026
CVE-2025-69061 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the MoveMe WordPress theme. Attackers can exploit improper filename control in include/...

📅 48 days ago • Jan 22, 2026
CVE-2025-69047 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the MaxShop WordPress theme. Attackers can include arbitrary local files through improp...

📅 48 days ago • Jan 22, 2026
CVE-2025-69049 8.1

This vulnerability allows attackers to include local PHP files through improper filename control in the Töbel WordPress theme. Attackers can potentia...

📅 48 days ago • Jan 22, 2026
CVE-2025-69050 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 48 days ago • Jan 22, 2026
CVE-2025-69039 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 48 days ago • Jan 22, 2026
CVE-2025-69041 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the Dekoro WordPress theme. Attackers can include arbitrary local files through imprope...

📅 48 days ago • Jan 22, 2026
CVE-2025-69044 8.1

This vulnerability allows attackers to include local PHP files through improper filename control in the Vango WordPress theme. Attackers can read sens...

📅 48 days ago • Jan 22, 2026
CVE-2025-69046 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the iRecco Core WordPress plugin. Attackers can include arbitrary local files on the se...

📅 48 days ago • Jan 22, 2026
CVE-2025-69004 8.1

This vulnerability allows attackers to include local files on the server through improper input validation in the Bajaar WordPress theme. Attackers ca...

📅 48 days ago • Jan 22, 2026
CVE-2025-69005 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP's include/require statements. It aff...

📅 48 days ago • Jan 22, 2026
CVE-2025-69037 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the Pippo WordPress theme. Attackers can include arbitrary local files through improper...

📅 48 days ago • Jan 22, 2026
CVE-2025-69038 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 48 days ago • Jan 22, 2026
CVE-2025-68908 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP's include/require statements. It aff...

📅 48 days ago • Jan 22, 2026
CVE-2025-68510 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 48 days ago • Jan 22, 2026
CVE-2025-67957 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 48 days ago • Jan 22, 2026
CVE-2025-67946 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 48 days ago • Jan 22, 2026
CVE-2025-67953 8.1

This vulnerability allows attackers to escalate privileges in the Booking Activities WordPress plugin. Any WordPress site running Booking Activities v...

📅 48 days ago • Jan 22, 2026
CVE-2025-67938 8.1

This vulnerability allows attackers to include local files on the server through improper filename control in PHP include/require statements. It affec...

📅 48 days ago • Jan 22, 2026
CVE-2025-67940 8.1

This CVE describes a PHP Local File Inclusion vulnerability in the Powerlift WordPress theme by Mikado-Themes. Attackers can exploit improper filename...

📅 48 days ago • Jan 22, 2026
CVE-2025-67941 8.1

This vulnerability allows attackers to include local files on the server through PHP's include/require statements in the The Aisle WordPress theme. At...

📅 48 days ago • Jan 22, 2026
CVE-2025-67615 8.1

This vulnerability allows attackers to include local files on the server through improper input validation in the Myour WordPress theme. Attackers can...

📅 48 days ago • Jan 22, 2026
CVE-2025-67616 8.1

This vulnerability allows attackers to include local files on the server through PHP's include/require statements in the Mella WordPress theme. Attack...

📅 48 days ago • Jan 22, 2026
CVE-2025-47555 8.1

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Tutor LMS WordPress plugin that allows attackers to bypass authorizatio...

📅 48 days ago • Jan 22, 2026
CVE-2026-24009 8.1

This vulnerability allows remote code execution through malicious YAML input in docling-core library versions 2.21.0 to 2.48.3. Attackers can execute ...

📅 48 days ago • Jan 22, 2026
CVE-2025-10856 8.1

This vulnerability allows attackers to upload malicious files to Teknoera software, potentially leading to file content injection attacks. It affects ...

📅 48 days ago • Jan 22, 2026
CVE-2026-24038 8.1

This vulnerability allows attackers to bypass two-factor authentication in Horilla HRMS by omitting the OTP field from authentication requests. When t...

📅 48 days ago • Jan 22, 2026
CVE-2026-23517 8.1

Fleet device management software versions before 4.78.3, 4.77.1, 4.76.2, 4.75.2, and 4.53.3 have broken access control that allows any authenticated u...

📅 49 days ago • Jan 21, 2026
CVE-2026-21989 8.1

This vulnerability in Oracle VM VirtualBox allows a high-privileged attacker with local access to the host system to compromise VirtualBox, potentiall...

📅 50 days ago • Jan 20, 2026
CVE-2026-21973 8.1

This vulnerability in Oracle FLEXCUBE Investor Servicing allows authenticated attackers with low privileges to perform unauthorized data manipulation ...

📅 50 days ago • Jan 20, 2026
CVE-2026-0726 8.1

The Nexter Extension plugin for WordPress has a PHP object injection vulnerability that allows unauthenticated attackers to inject malicious PHP objec...

📅 50 days ago • Jan 20, 2026
CVE-2025-14977 8.1

This vulnerability allows authenticated attackers with customer-level permissions or higher to access and modify other vendors' store settings in the ...

📅 50 days ago • Jan 20, 2026
CVE-2026-23876 8.1

A heap buffer overflow vulnerability in ImageMagick's XBM image decoder allows attackers to write controlled data beyond allocated memory boundaries w...

📅 50 days ago • Jan 20, 2026
CVE-2026-23846 8.1

CVE-2026-23846 is a sensitive information exposure vulnerability in Tugtainer where passwords are transmitted via URL query parameters instead of secu...

📅 51 days ago • Jan 19, 2026
CVE-2025-62291 8.1

This vulnerability in strongSwan's eap-mschapv2 plugin allows a malicious EAP-MSCHAPv2 server to trigger an integer underflow and heap-based buffer ov...

📅 54 days ago • Jan 16, 2026
CVE-2025-14510 8.1

This vulnerability involves an incorrect implementation of an authentication algorithm in ABB Ability OPTIMAX, potentially allowing attackers to bypas...

📅 54 days ago • Jan 16, 2026
CVE-2026-22864 8.1

This vulnerability allows attackers to bypass Deno's security restrictions on Windows by using case variations in file extensions (.BAT, .Bat instead ...

📅 54 days ago • Jan 15, 2026
CVE-2025-66292 8.1

CVE-2025-66292 is an arbitrary file deletion vulnerability in DPanel server management panel. Authenticated users can delete any file on the server vi...

📅 55 days ago • Jan 15, 2026
CVE-2026-22856 8.1

This CVE describes a race condition vulnerability in FreeRDP's serial channel IRP thread tracking that allows heap use-after-free. Attackers could exp...

📅 56 days ago • Jan 14, 2026
CVE-2026-20856 8.1

This vulnerability allows an unauthorized attacker to execute arbitrary code on Windows Server Update Service (WSUS) servers by sending specially craf...

📅 57 days ago • Jan 13, 2026
CVE-2025-25249 8.1

A heap-based buffer overflow vulnerability in multiple Fortinet products allows attackers to execute arbitrary code or commands via specially crafted ...

📅 57 days ago • Jan 13, 2026
CVE-2026-0891 8.1

This CVE describes memory safety bugs in Firefox and Thunderbird that could lead to memory corruption. With sufficient effort, attackers could potenti...

📅 57 days ago • Jan 13, 2026
CVE-2026-0877 8.1

This CVE describes a mitigation bypass vulnerability in the DOM Security component of Mozilla products. It allows attackers to circumvent security pro...

📅 57 days ago • Jan 13, 2026
CVE-2025-11669 8.1

This vulnerability allows attackers to bypass authorization controls in ManageEngine's privileged access management products when initiating remote se...

📅 57 days ago • Jan 13, 2026
CVE-2025-59022 8.1

This vulnerability allows backend users with access to the recycler module to delete arbitrary data from any database table defined in TYPO3's TCA, re...

📅 57 days ago • Jan 13, 2026
CVE-2026-0506 8.1

This CVE describes a Missing Authorization Check vulnerability in SAP ABAP systems that allows authenticated attackers to misuse RFC functions to exec...

📅 57 days ago • Jan 13, 2026
CVE-2026-0511 8.1

CVE-2026-0511 is a missing authorization vulnerability in SAP Fiori App Intercompany Balance Reconciliation that allows authenticated users to escalat...

📅 57 days ago • Jan 13, 2026
CVE-2025-68472 8.1

CVE-2025-68472 is an unauthenticated path traversal vulnerability in MindsDB's file upload API that allows attackers to read arbitrary files from the ...

📅 58 days ago • Jan 12, 2026

Why Track Trending CVEs?

Stay ahead of emerging threats: Newly discovered vulnerabilities pose the highest risk as attackers race to exploit them before patches are deployed. Trending CVEs represent the most critical security issues requiring immediate attention from security teams worldwide.

Prioritize remediation efforts: With thousands of CVEs published annually, security teams need to focus on the most recent and severe threats first. Our trending CVE dashboard highlights critical and high-severity vulnerabilities from the past 7, 30, or 90 days, helping you prioritize patching efforts.

🚀 Automated Trending CVE Monitoring

  • Scan your servers to detect packages affected by trending CVEs
  • Receive instant email alerts when critical vulnerabilities are discovered
  • Dashboard shows CVE age, severity, CVSS scores, and affected systems
  • Filter by time period (7/30/90 days) to focus on recent threats
Start Monitoring Trending CVEs Free