Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
wegia Vendor: wegia

About This Product

wegia is a software product offered by wegia. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 159 known vulnerabilities affecting wegia wegia. This includes 41 critical-severity issues and 38 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2024 to 2026, indicating a recent active security attention. 73 medium-severity issues and 7 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2024-53470 2024-12-05 2025-04-09 6.1 - -
CVE-2024-53471 2024-12-05 2025-04-09 6.1 - -
CVE-2024-53472 2024-12-05 2025-04-09 8.8 - -
CVE-2024-53473 2024-12-07 2025-04-09 7.5 - -
CVE-2025-22132 2025-01-07 2025-02-13 8.3 - -
CVE-2025-22133 2025-01-07 2025-04-09 9.9 - -
CVE-2025-22139 2025-01-08 2025-04-09 6.1 - -
CVE-2025-22140 2025-01-08 2025-04-09 8.8 - -
CVE-2025-22141 2025-01-08 2025-04-09 8.8 - -
CVE-2025-22143 2025-01-08 2025-02-13 6.1 - -
CVE-2025-22596 2025-01-10 2025-04-09 6.5 - -
CVE-2025-22597 2025-01-10 2025-10-02 8.3 - -
CVE-2025-22598 2025-01-10 2025-10-02 8.3 - -
CVE-2025-22599 2025-01-10 2025-04-09 6.5 - -
CVE-2025-22600 2025-01-10 2025-04-09 6.5 - -
CVE-2025-22613 2025-01-13 2025-04-09 5.4 - -
CVE-2025-22614 2025-01-13 2025-02-13 5.4 - -
CVE-2025-22615 2025-01-13 2025-02-13 6.1 - -
CVE-2025-22616 2025-01-13 2025-02-13 5.4 - -
CVE-2025-22617 2025-01-13 2025-02-13 6.1 - -
CVE-2025-22618 2025-01-13 2025-02-13 5.4 - -
CVE-2025-22619 2025-01-13 2025-02-13 6.1 - -
CVE-2025-23030 2025-01-14 2025-02-13 6.1 - -
CVE-2025-23031 2025-01-14 2025-02-13 5.4 - -
CVE-2025-23032 2025-01-14 2025-02-13 5.4 - -
CVE-2025-23033 2025-01-14 2025-02-13 5.4 - -
CVE-2025-23034 2025-01-14 2025-02-13 6.1 - -
CVE-2025-23035 2025-01-14 2025-02-13 5.4 - -
CVE-2025-23036 2025-01-14 2025-04-09 5.4 - -
CVE-2025-23037 2025-01-14 2025-04-09 5.4 - -
CVE-2025-23038 2025-01-14 2025-02-13 5.4 - -
CVE-2024-57030 2025-01-17 2025-04-09 8.1 - -
CVE-2024-57031 2025-01-17 2025-03-24 9.8 - -
CVE-2024-57032 2025-01-17 2025-03-19 9.8 - -
CVE-2024-57034 2025-01-17 2025-03-14 9.8 - -
CVE-2024-57033 2025-01-17 2025-04-09 6.1 - -
CVE-2024-57035 2025-01-17 2025-03-18 9.8 - -
CVE-2025-23218 2025-01-20 2025-02-28 9.8 - -
CVE-2025-23219 2025-01-20 2025-02-28 9.8 - -
CVE-2025-23220 2025-01-20 2025-02-28 9.8 - -
CVE-2025-24020 2025-01-21 2025-02-13 6.1 - -
CVE-2025-24901 2025-02-03 2025-02-13 8.8 - -
CVE-2025-24902 2025-02-03 2025-08-22 8.8 - -
CVE-2025-24905 2025-02-03 2025-02-13 9.8 - -
CVE-2025-24906 2025-02-03 2025-02-13 9.8 - -
CVE-2025-24957 2025-02-03 2025-02-13 9.8 - -
CVE-2025-24958 2025-02-03 2025-02-13 8.8 - -
CVE-2025-26605 2025-02-18 2025-04-10 8.8 - -
CVE-2025-26606 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26607 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26608 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26609 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26610 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26611 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26612 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26613 2025-02-18 2025-02-28 9.8 - -
CVE-2025-26614 2025-02-18 2025-02-28 8.8 - -
CVE-2025-26615 2025-02-18 2025-02-28 10.0 - -
CVE-2025-26616 2025-02-18 2025-02-28 7.5 - -
CVE-2025-26617 2025-02-18 2025-02-28 9.8 - -
CVE-2025-27096 2025-02-20 2025-02-28 9.8 - -
CVE-2025-27133 2025-02-24 2025-02-28 8.8 - -
CVE-2025-27140 2025-02-24 2025-02-28 9.8 - -
CVE-2025-27417 2025-03-03 2025-04-11 6.1 - -
CVE-2025-27418 2025-03-03 2025-04-10 5.4 - -
CVE-2025-27419 2025-03-03 2025-03-07 7.5 - -
CVE-2025-27420 2025-03-03 2025-04-10 5.4 - -
CVE-2025-27499 2025-03-03 2025-03-06 6.1 - -
CVE-2025-29782 2025-03-14 2025-03-25 5.4 - -
CVE-2025-30361 2025-03-27 2025-04-10 9.8 - -
CVE-2025-30362 2025-03-27 2025-04-10 5.4 - -
CVE-2025-30363 2025-03-27 2025-04-10 5.4 - -
CVE-2025-30364 2025-03-27 2025-04-10 9.8 - -
CVE-2025-30365 2025-03-27 2025-04-10 9.8 - -
CVE-2025-30366 2025-03-27 2025-04-10 5.4 - -
CVE-2025-30367 2025-03-27 2025-04-10 9.8 - -
CVE-2025-46828 2025-05-07 2025-07-02 9.8 - -
CVE-2025-50201 2025-06-19 2025-07-02 9.8 - -
CVE-2025-52474 2025-06-19 2025-07-02 9.8 - -
CVE-2025-6694 2025-06-26 2025-07-01 3.5 4.0 Likely
CVE-2025-6695 2025-06-26 2025-07-01 3.5 4.0 Likely
CVE-2025-6696 2025-06-26 2025-07-01 3.5 4.0 Likely
CVE-2025-6697 2025-06-26 2025-07-01 3.5 4.0 Likely
CVE-2025-6698 2025-06-26 2025-07-01 3.5 4.0 Likely
CVE-2025-6699 2025-06-26 2025-07-01 3.5 4.0 Likely
CVE-2025-53091 2025-06-27 2025-07-08 9.8 - -
CVE-2025-53377 2025-07-07 2025-07-10 6.1 - -
CVE-2025-53525 2025-07-07 2025-07-10 6.1 - -
CVE-2025-53526 2025-07-07 2025-07-10 6.1 - -
CVE-2025-53527 2025-07-07 2025-07-10 9.8 - -
CVE-2025-53529 2025-07-07 2025-07-10 9.8 - -
CVE-2025-53530 2025-07-07 2025-07-10 7.5 - -
CVE-2025-53531 2025-07-07 2025-07-10 7.5 - -
CVE-2025-53820 2025-07-14 2025-07-15 6.5 - -
CVE-2025-53821 2025-07-14 2025-07-18 4.7 - -
CVE-2025-53822 2025-07-14 2025-07-15 6.5 - -
CVE-2025-53823 2025-07-14 2025-07-15 8.8 - -
CVE-2025-53824 2025-07-14 2025-07-15 5.4 - -
CVE-2025-53929 2025-07-16 2025-07-25 5.4 - -
CVE-2025-53930 2025-07-16 2025-07-25 5.4 - -
CVE-2025-53931 2025-07-16 2025-07-25 5.4 - -
CVE-2025-53932 2025-07-16 2025-07-25 6.1 - -
CVE-2025-53933 2025-07-16 2025-07-25 5.4 - -
CVE-2025-53934 2025-07-16 2025-07-25 5.4 - -
CVE-2025-53935 2025-07-16 2025-07-25 6.1 - -
CVE-2025-53936 2025-07-16 2025-07-25 6.1 - -
CVE-2025-53937 2025-07-16 2025-07-25 9.8 - -
CVE-2025-53938 2025-07-16 2025-07-25 7.5 - -
CVE-2025-53946 2025-07-17 2025-07-30 8.8 - -
CVE-2025-54058 2025-07-17 2025-07-30 8.8 - -
CVE-2025-54060 2025-07-17 2025-07-30 8.8 - -
CVE-2025-54061 2025-07-17 2025-07-30 8.8 - -
CVE-2025-54062 2025-07-17 2025-07-30 8.8 - -
CVE-2025-54076 2025-07-18 2025-07-30 6.5 - -
CVE-2025-54077 2025-07-18 2025-07-30 6.5 - -
CVE-2025-54078 2025-07-18 2025-07-30 6.5 - -
CVE-2025-54079 2025-07-18 2025-07-30 8.8 - -
CVE-2025-55167 2025-08-12 2025-08-18 9.8 - -
CVE-2025-55168 2025-08-12 2025-08-14 9.8 - -
CVE-2025-55169 2025-08-12 2025-08-14 6.5 - -
CVE-2025-55170 2025-08-12 2025-08-14 6.5 - -
CVE-2025-55171 2025-08-12 2025-08-14 7.5 - -
CVE-2025-57761 2025-08-21 2025-08-22 8.8 - -
CVE-2025-57762 2025-08-21 2025-08-22 6.1 - -
CVE-2025-57763 2025-08-21 2025-08-22 6.1 - -
CVE-2025-57764 2025-08-21 2025-08-22 6.5 - -
CVE-2025-57765 2025-08-21 2025-08-22 6.5 - -
CVE-2025-58159 2025-08-29 2025-09-24 9.9 - -
CVE-2025-58452 2025-09-08 2025-09-17 6.1 - -
CVE-2025-58453 2025-09-08 2025-09-17 8.2 - -
CVE-2025-58454 2025-09-08 2025-09-17 8.2 - -
CVE-2025-58745 2025-09-08 2025-09-17 9.9 - -
CVE-2025-59939 2025-09-27 2025-10-06 8.8 - -
CVE-2025-61603 2025-10-02 2025-10-07 9.8 - -
CVE-2025-61604 2025-10-02 2025-10-07 7.1 - -
CVE-2025-61605 2025-10-02 2025-10-07 9.8 - -
CVE-2025-61606 2025-10-02 2025-10-07 6.1 - -
CVE-2025-61665 2025-10-02 2025-10-07 7.5 - -
CVE-2025-62177 2025-10-13 2025-10-20 8.8 - -
CVE-2025-62178 2025-10-13 2025-10-20 3.5 - -
CVE-2025-62179 2025-10-13 2025-10-20 8.8 - -
CVE-2025-62358 2025-10-13 2025-10-20 5.4 - -
CVE-2025-62359 2025-10-13 2025-10-20 6.1 - -
CVE-2025-62360 2025-10-13 2025-10-20 8.8 - -
CVE-2025-62361 2025-10-13 2025-10-20 6.1 - -
CVE-2025-62597 2025-10-21 2025-10-24 6.1 - -
CVE-2025-62598 2025-10-21 2025-10-22 6.1 - -
CVE-2025-67496 2025-12-09 2025-12-18 4.3 - -
CVE-2025-67501 2025-12-10 2025-12-18 8.8 - -
CVE-2026-23722 2026-01-16 2026-01-30 9.1 - -
CVE-2026-23723 2026-01-16 2026-01-30 7.2 - -
CVE-2026-23724 2026-01-16 2026-01-30 4.3 - -
CVE-2026-23725 2026-01-16 2026-01-30 5.4 - -
CVE-2026-23726 2026-01-16 2026-01-30 6.1 - -
CVE-2026-23727 2026-01-16 2026-01-30 6.1 - -
CVE-2026-23728 2026-01-16 2026-01-30 6.1 - -
CVE-2026-23729 2026-01-16 2026-01-30 6.1 - -
CVE-2026-23730 2026-01-16 2026-01-30 6.1 - -
CVE-2026-23731 2026-01-16 2026-01-30 4.3 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for wegia wegia by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.