diff --git a/crowdsec-docs/sidebarsUnversioned.ts b/crowdsec-docs/sidebarsUnversioned.ts
index 619ddf965..a02b71324 100644
--- a/crowdsec-docs/sidebarsUnversioned.ts
+++ b/crowdsec-docs/sidebarsUnversioned.ts
@@ -220,6 +220,11 @@ const sidebarsUnversionedConfig: SidebarConfig = {
label: "Advanced search",
id: "console/cti/advanced_search",
},
+ {
+ type: "doc",
+ label: "CVE Explorer",
+ id: "console/cti/cve_explorer",
+ },
{
type: "doc",
label: "FAQ",
diff --git a/crowdsec-docs/static/img/console/cti/cve-explorer/cve-blocklist-button.png b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-blocklist-button.png
new file mode 100644
index 000000000..31db04008
Binary files /dev/null and b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-blocklist-button.png differ
diff --git a/crowdsec-docs/static/img/console/cti/cve-explorer/cve-blocklist-modal.png b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-blocklist-modal.png
new file mode 100644
index 000000000..5c77c8790
Binary files /dev/null and b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-blocklist-modal.png differ
diff --git a/crowdsec-docs/static/img/console/cti/cve-explorer/cve-description.png b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-description.png
new file mode 100644
index 000000000..02957dd13
Binary files /dev/null and b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-description.png differ
diff --git a/crowdsec-docs/static/img/console/cti/cve-explorer/cve-details-head.png b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-details-head.png
new file mode 100644
index 000000000..0f860a291
Binary files /dev/null and b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-details-head.png differ
diff --git a/crowdsec-docs/static/img/console/cti/cve-explorer/cve-events.png b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-events.png
new file mode 100644
index 000000000..4a2e79767
Binary files /dev/null and b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-events.png differ
diff --git a/crowdsec-docs/static/img/console/cti/cve-explorer/cve-home.png b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-home.png
new file mode 100644
index 000000000..8fd98f0c4
Binary files /dev/null and b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-home.png differ
diff --git a/crowdsec-docs/static/img/console/cti/cve-explorer/cve-ips.png b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-ips.png
new file mode 100644
index 000000000..e1253fc34
Binary files /dev/null and b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-ips.png differ
diff --git a/crowdsec-docs/static/img/console/cti/cve-explorer/cve-list-item.png b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-list-item.png
new file mode 100644
index 000000000..04b127b4b
Binary files /dev/null and b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-list-item.png differ
diff --git a/crowdsec-docs/static/img/console/cti/cve-explorer/cve-search.png b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-search.png
new file mode 100644
index 000000000..4f859f0ed
Binary files /dev/null and b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-search.png differ
diff --git a/crowdsec-docs/static/img/console/cti/cve-explorer/cve-shortcuts.png b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-shortcuts.png
new file mode 100644
index 000000000..ee8520dea
Binary files /dev/null and b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-shortcuts.png differ
diff --git a/crowdsec-docs/static/img/console/cti/cve-explorer/cve-timeline.png b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-timeline.png
new file mode 100644
index 000000000..55f199278
Binary files /dev/null and b/crowdsec-docs/static/img/console/cti/cve-explorer/cve-timeline.png differ
diff --git a/crowdsec-docs/unversioned/console/cti/cve_explorer.md b/crowdsec-docs/unversioned/console/cti/cve_explorer.md
new file mode 100644
index 000000000..90ddc5aae
--- /dev/null
+++ b/crowdsec-docs/unversioned/console/cti/cve_explorer.md
@@ -0,0 +1,184 @@
+# CVE Explorer
+
+The CVE Explorer is essentially a threat‑intelligence dashboard for CVEs. By combining CVE metadata with CrowdSec’s detection data, it lets users see which vulnerabilities attackers are actively exploiting, track emerging trends, examine exploitation timelines, and obtain actionable indicators (malicious IPs and Blocklists). Searching or filtering quickly narrows the list, while the detailed pages give insight into attack behavior and mitigation steps.
+
+
+> **Try it now** → [https://app.crowdsec.net/cti/cve-explorer](https://app.crowdsec.net/cti/cve-explorer)
+
+
+

+
+
+---
+
+## CVEs Exploration
+
+### Search Bar
+
+

+
+
+
+At the top of the CVE Explorer sits a unified search field where you can instantly filter the entire CVE catalog by:
+
+* **CVE ID** (e.g. `CVE-2021-44228`)
+* **Product or Vendor** (e.g. Apache, Cisco)
+* **Attack Type** (e.g. RCE, XSS)
+
+Type your query, hit **Search**, and the list below updates in real-time.
+
+---
+
+### Quick-Filter Cards
+
+
+

+
+
+Directly under the search bar are three actionable buttons that sort all CVEs in the database:
+
+1. **Trending CVEs**
+
+ * Vulnerabilities with the fastest week-over-week growth in exploit detections.
+2. **Recently Tracked CVEs**
+
+ * Newly observed by CrowdSec for catching zero-day or freshly published ones.
+3. **Most Exploited CVEs**
+
+ * Ranked by total unique attacking IPs, showing the biggest exploits first.
+
+---
+
+### CVE Result List
+
+
+

+
+
+
+Beneath the filters, CVEs are presented as concise “cards” with these key data points:
+
+* **Title & ID** (click anywhere on the card to drill down)
+* **CrowdSec Score** (0–10 risk rating)
+* **Sparkline** of exploit volume over the last 7 days
+* **First Detection** date in CrowdSec’s network
+* **# of Exploiting IPs** badge on the right
+* **Product/Vendor** tags
+
+
+## CVE Details Page
+
+
+
+

+
+
+The header zone tells you, at a glance, how dangerous the vulnerability is for your stack:
+
+
+* **CrowdSec Score** – CrowdSec proprietary risk rating (0-10)
+* **CVSS Base Score** – industry-standard severity
+* **Published / First Seen** – NVD publication date and the first time CrowdSec witnessed exploitation in the wild
+* **Exploiting IPs** – unique IPs detected attacking with this CVE
+* **Products / Vendors** – affected software stack
+
+> **Pro tip:** The *CrowdSec score* represents the calculation of how dangerous a given vulnerability is based on the attacks seen by our network. It is designed to help defenders weigh how serious an alert from their security system should be treated and whether they should prioritize the vulnerability in patch management.
+> The score is based on two key factors:
+> - Attacker Focus
+> - Vulnerability Trendiness
+>
+> *Attacker Focus* scores the behaivor of the attackers that target this vulnerability. If the attackers consist mainly of automated bots that opportunistically scan the whole internet, the vulnerability gets a lower score as the attacks will be mostly noise. If a vulnerability sees mainly sophisticated targeted exploits it gets a high score, encouraging defenders to check the details of their alert to make sure its not part of a campaign against their perimeter. \
+> *Vulnerability Trendiness* scores how the signals received by the CrowdSec network have evolved over time. Vulnerabilities that see high week-on-week growth in exploit volume are scored higher than ones where the exploit volume is on a decline. This score helps put vulnerabilities back into focus of defenders if some external factor (such as a related vulnerability) causes attacks to pick up.
+> In addition to the two factors above, an additional flat bonus is given to recently published vulnerabilities to account for uncertainties and missing data.
+
+
+---
+
+### Key Information
+
+
+
+
+
+

+
+
+* **NIST Description** –
+Standard CVE description originating from the NIST database.
+
+
+
+* **CrowdSec Analysis** –
+The CrowdSec analysis is a threat-report written by security experts at CrowdSec.
+It generally starts by identifying the CVE technical impact, then goes on to characterize attacker behavior (broad, automated scans), summarizes telemetry trends (steady, sustained exploitation), and can pinpointing specific attack vectors in use.
+
+
+---
+
+### Exploitation Timeline
+
+Understand momentum at a glance.
+
+
+
+

+
+
+*Interactive chart* displays exploit attempts per hour/day.
+
+> **Pro tip:** Switch the drop-down (Last 24 h / 7 days / 30 days) to zoom in on surges.
+
+
+Some CVEs can also display an **Event Log** records milestones:
+
+
+
+

+
+
+---
+
+### Detected IPs
+
+CrowdSec correlates every exploit hit with the attacking source.
+
+
+
+
+

+
+
+* **Classification** – Malicious / Suspicious / Benign
+* **Country & ASN** – geolocation and network owner
+* **Behaviours** – brute-force, aggressive crawling, etc.
+* **Pivot** – click any IP to open its full CrowdSec **IP Report** (see the IP-level doc).
+
+Need more? Click **“See more IPs”** to expand to the full list.
+
+---
+
+### Blocklist
+
+
+
+
+

+
+
+At the moment, per-CVE blocklists aren’t yet available. However, you can add any CVE to your Blocklist Wishlist.
+Once CrowdSec generates and publishes the dedicated Blocklist for that vulnerability, you’ll automatically receive a notification and be able to install it. This way, you can queue up your highest-priority CVEs now and be ready to deploy protection the moment the feeds go live.
+
+
+
+## Why This CVE Monitoring Matters
+
+* **Instant prioritization**: See at a glance, the vulnerabilities most threatening to your perimeter.
+* **Unified search**: No need to switch between NVD, vendor advisories or SIEM, logs—everything’s right here.
+* **Trend visibility**: Sparkline + “Trending” filter lets you jump on surging exploits before they go mainstream.
+* **Actionable**: Each detail page links directly IP details—so you can pivot from insight to action in few clicks.
+
+With this dashboard as your starting point, you’ll always know *which* CVEs deserve your attention first, and have the tools to rapidly investigate and block the threats exploiting them.
+
+> Ready to out-pace the exploiters? **Start exploring now** → [https://app.crowdsec.net/cti/cve-explorer](https://app.crowdsec.net/cti/cve-explorer)
+
+*(Documentation last updated : 31 July 2025)*