Below is a list of security advisories and CVEs discovered during independent research and security assessments. Click an entry to expand the full details.

CVE-2025-46320
8.8 High +

A cross-site scripting (XSS) vulnerability in a FileMaker WebDirect custom homepage could lead to unauthorized access and remote code execution. This vulnerability has been fully addressed in FileMaker Server 22.0.4 and FileMaker Server 21.1.7.

Impact
unauthorized access and remote code execution
Affected
FileMaker Server <= 22.0.4
Fixed in
FileMaker Server 22.0.4
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
References
CVE-2025-46296
5.4 Medium +

An authorization bypass vulnerability in FileMaker Server Admin Console allowed administrator roles with minimal privileges to access administrative features such as viewing license details and downloading application logs.

Impact
Authorization bypass leading to privilege escalation.
Affected
FileMaker Server <= 22.0.4
Fixed in
FileMaker Server 22.0.4
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
References
CVE-2025-46294
5.3 Medium +

To enhance security, the FileMaker Server 22.0.4 installer now includes an option to disable IIS short filename enumeration by setting NtfsDisable8dot3NameCreation in the Windows registry. This prevents attackers from using the tilde character to discover hidden files and directories. This vulnerability has been fully addressed in FileMaker Server 22.0.4. The IIS Shortname Vulnerability exploits how Microsoft IIS handles legacy 8.3 short filenames, allowing attackers to infer the existence of files or directories by crafting requests with the tilde (~) character.

Impact
IIS misconfiguration to content discovery
Affected
FileMaker Server <= 22.0.4
Fixed in
FileMaker Server 22.0.4
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
References
CVE-2023-0581
5.3 Medium +

The PrivateContent plugin for WordPress is vulnerable to protection mechanism bypass due to the use of client side validation in versions up to, and including, 8.4.3. This is due to the plugin checking if an IP had been blocklist via client-side scripts rather than server-side. This makes it possible for unauthenticated attackers to bypass any login restrictions that may prevent a brute force attack.

Impact
bypass login restrictions and anti brute-force mechanism
Affected
PrivateContent <= 8.4.3
Fixed in
PrivateContent 8.4.4
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N


Research Activity

You can find me on the following platforms:

Apple Security
Bug bounty
Visit →
Apple Security bounty
Cyberdart
Bug bounty
Visit →
Private & public programs.
Bugcrowd
Bug bounty
Visit →
VDP and managed programs.
Unguess
Bug bounty
Visit →
IT-focused programs.
Separator