#Authenticated
Auto Featured Image <= 4.2.1 - Missing Authorization to Authenticated (Contri... The Auto Featured Image (Auto Post Thumbnail) plugin for WordPress is vulnerable to unauthorized modification of ...

Origin | Interest | Match
CVE-2025-13794 | THREATINT
CVE-2025-13794: The Auto Featured Image (Auto Post Thumbnail) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the bulk_action_generate_handler function in all versions up to, and including, 4.2.1. This makes it possi...
cve.threatint.eu
December 16, 2025 at 6:44 AM
CVE-2025-67736 - Authenticated SQL Injection in FreePBX tts (Text To Speech) module
CVE ID : CVE-2025-67736

Published : Dec. 16, 2025, 1:15 a.m. | 1 hour, 52 minutes ago

Description : The FreePBX module tts (Text to Speech) for FreePBX, an open-source web-based graphical...
CVE-2025-67736 - Authenticated SQL Injection in FreePBX tts (Text To Speech) module
The FreePBX module tts (Text to Speech) for FreePBX, an open-source web-based graphical user interface (GUI) that manages Asterisk. Versions prior to 16.0.5 and 17.0.5 are vulnerable to SQL injection by authenticated users with administrator access. Authenticated users with administrative access to the Administrator Control Panel (ACP) can leverage this …
cvefeed.io
December 16, 2025 at 3:47 AM
CVE-2025-67722 - Authenticated amportal search for ‘freepbx_engine’ in non root writeable directories leads to potential privilege escalation
CVE ID : CVE-2025-67722

Published : Dec. 16, 2025, 1:15 a.m. | 1 hour, 52 minutes ago

Description : FreePBX is an open-source web...
CVE-2025-67722 - Authenticated amportal search for ‘freepbx_engine’ in non root writeable directories leads to potential privilege escalation
FreePBX is an open-source web-based graphical user interface (GUI) that manages Asterisk. Prior to versions 16.0.45 and 17.0.24 of the FreePBX framework, an authenticated local privilege escalation exists in the deprecated FreePBX startup script `amportal`. In the deprecated `amportal` utility, the lookup for the `freepbx_engine` file occurs in `/etc/asterisk/` directories. …
cvefeed.io
December 16, 2025 at 3:20 AM
It offers safe password spray attacks with built-in delay and jitter to prevent account lockouts, automatic removal of successfully authenticated users, and credential analysis against secretsdump files.

Try: github.com/MorDavid/Don...
GitHub - MorDavid/DonPwner: Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database
Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database - MorDavid/DonPwner
github.com
December 16, 2025 at 2:37 AM
3/12🧵

📌q4414 - “EAM LOYALISTS”
“EAM” is a real military term: Emergency Action Message
—a highly formatted, authenticated message type used in U.S. strategic command-and-control (often discussed in the context of nuclear command-and-control).
December 16, 2025 at 12:54 AM
I don’t think any of it has been authenticated.
December 16, 2025 at 12:36 AM
ratproto authenticated transfer protocol
December 16, 2025 at 12:19 AM
CVE-2023-53888 - Zomplog 3.9 Remote Code Execution via Authenticated File Manipulation
CVE ID : CVE-2023-53888

Published : Dec. 15, 2025, 9:15 p.m. | 1 hour, 52 minutes ago

Description : Zomplog 3.9 contains a remote code execution vulnerability that allows authenticated...
CVE-2023-53888 - Zomplog 3.9 Remote Code Execution via Authenticated File Manipulation
Zomplog 3.9 contains a remote code execution vulnerability that allows authenticated attackers to inject and execute arbitrary PHP code through file manipulation endpoints. Attackers can upload malicious JavaScript files, rename them to PHP, and execute system commands by exploiting the saveE and rename actions in the application.
cvefeed.io
December 15, 2025 at 11:59 PM
CVE-2023-53889 - Perch CMS 3.2 Remote Code Execution via Unrestricted File Upload
CVE ID : CVE-2023-53889

Published : Dec. 15, 2025, 9:15 p.m. | 1 hour, 52 minutes ago

Description : Perch CMS 3.2 contains a remote code execution vulnerability that allows authenticated ad...
CVE-2023-53889 - Perch CMS 3.2 Remote Code Execution via Unrestricted File Upload
Perch CMS 3.2 contains a remote code execution vulnerability that allows authenticated administrators to upload arbitrary PHP files through the assets management interface. Attackers can upload a malicious .phar file with embedded system command execution capabilities to execute arbitrary commands on the server.
cvefeed.io
December 15, 2025 at 11:39 PM
CVE-2023-53890 - Perch CMS 3.2 Stored Cross-Site Scripting via SVG File Upload
CVE ID : CVE-2023-53890

Published : Dec. 15, 2025, 9:15 p.m. | 1 hour, 52 minutes ago

Description : Perch CMS 3.2 contains a stored cross-site scripting vulnerability that allows authenticated...
CVE-2023-53890 - Perch CMS 3.2 Stored Cross-Site Scripting via SVG File Upload
Perch CMS 3.2 contains a stored cross-site scripting vulnerability that allows authenticated users to upload malicious SVG files with embedded JavaScript. Attackers can craft SVG files with script tags that execute when the file is viewed, potentially stealing user session information or performing client-side attacks.
cvefeed.io
December 15, 2025 at 11:34 PM
CVE-2023-53887 - Zomplog 3.9 Cross-Site Scripting Vulnerability via Page Creation
CVE ID : CVE-2023-53887

Published : Dec. 15, 2025, 9:15 p.m. | 1 hour, 52 minutes ago

Description : Zomplog 3.9 contains a cross-site scripting vulnerability that allows authenticated users...
CVE-2023-53887 - Zomplog 3.9 Cross-Site Scripting Vulnerability via Page Creation
Zomplog 3.9 contains a cross-site scripting vulnerability that allows authenticated users to inject malicious scripts when creating new pages. Attackers can craft malicious image source and onerror attributes to execute arbitrary JavaScript code in victim's browser.
cvefeed.io
December 15, 2025 at 11:24 PM
CVE-2023-53885 - Webutler v3.2 Remote Code Execution via Arbitrary File Upload
CVE ID : CVE-2023-53885

Published : Dec. 15, 2025, 9:15 p.m. | 1 hour, 52 minutes ago

Description : Webutler v3.2 contains a remote code execution vulnerability that allows authenticated admin...
CVE-2023-53885 - Webutler v3.2 Remote Code Execution via Arbitrary File Upload
Webutler v3.2 contains a remote code execution vulnerability that allows authenticated administrators to upload PHP files with system command execution. Attackers can upload a PHAR file with embedded system commands to the media browser and execute arbitrary commands by accessing the uploaded file.
cvefeed.io
December 15, 2025 at 11:17 PM
CVE-2023-53880 - Lucee 5.4.2.17 Authenticated Reflected Cross-Site Scripting via Admin Interfaces
CVE ID : CVE-2023-53880

Published : Dec. 15, 2025, 9:15 p.m. | 1 hour, 52 minutes ago

Description : Lucee 5.4.2.17 contains a reflected cross-site scripting vulnerability th...
CVE-2023-53880 - Lucee 5.4.2.17 Authenticated Reflected Cross-Site Scripting via Admin Interfaces
Lucee 5.4.2.17 contains a reflected cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through administrative interface parameters. Attackers can craft specific payloads targeting admin pages like server.cfm and web.cfm to execute arbitrary JavaScript in victim's browser sessions.
cvefeed.io
December 15, 2025 at 11:12 PM
For those keeping track: this is the same bank that made me change my login PIN to a real password, but a different bank than the one that rejected my login on mobile and then authenticated my desktop login using the phone it had just rejected a login from
December 15, 2025 at 10:52 PM
Why is Jeff Hoffman's banner $25 cheaper? 😭
December 15, 2025 at 10:00 PM
CVE-2023-53892 - Blackcat CMS 1.4 Remote Code Execution via Jquery Plugin Manager
CVE ID : CVE-2023-53892

Published : Dec. 15, 2025, 8:28 p.m. | 1 hour ago

Description : Blackcat CMS 1.4 contains a remote code execution vulnerability that allows authenticated administrat...
CVE-2023-53892 - Blackcat CMS 1.4 Remote Code Execution via Jquery Plugin Manager
Blackcat CMS 1.4 contains a remote code execution vulnerability that allows authenticated administrators to upload malicious PHP files through the jquery plugin manager. Attackers can upload a zip file with a PHP shell script and execute arbitrary system commands by accessing the uploaded plugin's PHP file with a 'code' parameter.
cvefeed.io
December 15, 2025 at 9:55 PM
CVE-2023-53869 - WEBIGniter 28.7.23 Unrestricted File Upload Remote Code Execution
CVE ID : CVE-2023-53869

Published : Dec. 15, 2025, 8:28 p.m. | 1 hour ago

Description : WEBIGniter 28.7.23 contains a file upload vulnerability that allows authenticated attackers to uploa...
CVE-2023-53869 - WEBIGniter 28.7.23 Unrestricted File Upload Remote Code Execution
WEBIGniter 28.7.23 contains a file upload vulnerability that allows authenticated attackers to upload and execute dangerous PHP files through the media function. Attackers can leverage any created account to upload malicious PHP scripts that enable remote code execution on the application server.
cvefeed.io
December 15, 2025 at 9:45 PM
Robots don’t replace workers. They replace dangerous and repetitive tasks.
We’re building Australian robotics with verified movement data, authenticated training and government oversight.
Full post on LinkedIn.
Paul Nelson | HaveAChat.AI
#AI4Women #AIRobotics #authenticatedintelligence
December 15, 2025 at 9:38 PM
Had a response to one of those "I love your music, don't be political" folks a while back that got me a nice message from (authenticated) Tom Morello, made my month.
December 15, 2025 at 8:01 PM
🔴 Multiple independent bodies have reaffirmed UNRWA’s neutrality & found no substantiated evidence supporting Israel’s claims that the agency operates as a Hamas affiliate, despite continued Israeli allegations:

1. Colonna Review: A review led by fmr French foreign minister Catherine Colonna...
December 15, 2025 at 6:07 PM
The missing piece might just be for Bluesky, as the one service any atproto user is most likely signed into, to implement a “redirect to the authenticated account’s PDS login page, forwarding a callback URL” endpoint? This could be independent of any optimizations for your app’s returning users
December 15, 2025 at 5:29 PM
Bitcoin holders are authenticated using digital signatures that depend on elliptic curve cryptography (ECC)," Scott Aaronson, a University of Texas computer scientist involved in the study, told IBD. "And quantum computers have been known to be able to break elliptic curve cryptography for 30 years.
December 15, 2025 at 3:54 PM
Print it off? They would only say they can't comment until the printout is authenticated.
December 15, 2025 at 3:47 PM