Saturday, December 20, 2025 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

đŸŽ¯ SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Saturday's disclosure cycle reports 13 critical CVEs, a 48% decrease from Friday's 25 critical vulnerabilities. High-priority issues declined 9% to 91 CVEs, while actively exploited vulnerabilities increased 6% to 17 KEV entries. Notable KEV additions include CVE-2025-59718 affecting Fortinet products, CVE-2025-48633 and CVE-2025-48572 targeting Android Framework, CVE-2025-40602 in SonicWall SMA1000 appliances, and CVE-2025-20393 impacting Cisco products. Critical vulnerabilities include CVE-2025-13329 (arbitrary file upload in File Uploader for WooCommerce), CVE-2025-68613 (CVSS 9.9), and CVE-2025-14964 affecting TOTOLINK devices. Patch availability stands at 0%, requiring compensating controls across all disclosed vulnerabilities.

  • 13 critical CVEs disclosed, down 48% from Friday's 25
  • 91 high-priority vulnerabilities, a 9% decrease from 100
  • 17 actively exploited CVEs including Fortinet, Android Framework, SonicWall SMA1000, and Cisco products
  • 0% patch availability requires immediate compensating controls
  • WordPress plugins (File Uploader for WooCommerce, Flex Store Users) and network appliances (TOTOLINK, D-Link) heavily represented

Immediate action: Prioritize network segmentation and access controls for Fortinet, SonicWall, and Cisco devices listed in KEV entries. Implement web application firewall rules to block exploitation attempts against WordPress plugin vulnerabilities. Weekend security teams should monitor for exploitation activity against Android Framework and WinRAR vulnerabilities while awaiting vendor patches.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation