Latest Vulnerabilities Updates: AppSecWorld's CVE Daily Digest for April 12-13, 2025

In the dynamic realm of cybersecurity, staying updated on the latest vulnerabilities is imperative.
This edition of the AppSecWorld's CVE Daily Digest provides a snapshot of the vulnerabilities published in National Vulnerability Database between April 12-13, 2025.
During this period, The National Vulnerability Database published 15, and these new Common Vulnerabilities and Exposures (CVEs) are classified as follows:

Critical: 0
High: 3
Medium: 12
Low: 0
Severity Not Assigned: 0

Identifying and understanding these vulnerabilities are pivotal steps towards enhancing security measures and creating a safer digital environment.
Now, let's delve deeper into AppSecWorld's CVE Daily Digest, spotlighting the Critical and High Severity vulnerabilities that demand immediate attention.

1. CVE-2025-29803
Base Score: 7.3
Base Severity: HIGH
Exploitability Score: 1.3
Impact Score: 5.9
Description: Uncontrolled search path element in Visual Studio Tools for Applications and SQL Server Management Studio allows an authorized attacker to elevate privileges locally.
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29803

CWE-ID: CWE-427
Common Platform Enumerations (CPE): Not Found

2. CVE-2025-29834
Base Score: 7.5
Base Severity: HIGH
Exploitability Score: 1.6
Impact Score: 5.9
Description: Out-of-bounds read in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.
References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29834

CWE-ID: CWE-125
Common Platform Enumerations (CPE): Not Found

3. CVE-2025-3418
Base Score: 8.8
Base Severity: HIGH
Exploitability Score: 2.8
Impact Score: 5.9
Description: The WPC Admin Columns plugin for WordPress is vulnerable to privilege escalation in versions 2.0.6 to 2.1.0. This is due to the plugin not properly restricting user meta values that can be updated through the ajax_edit_save() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update their role to that of an administrator.
References: https://plugins.trac.wordpress.org/changeset/3269302/wpc-admin-columns/trunk/includes/class-backend.php
https://www.wordfence.com/threat-intel/vulnerabilities/id/6145e2d7-c917-4814-a13e-6d34088cb784?source=cve

CWE-ID: CWE-269
Common Platform Enumerations (CPE): Not Found

Previous Post Next Post

Contact Form