A prototype pollution in the lib
Description
A prototype pollution in the lib
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Search and filter 8341 vulnerabilities with AI analyst insights
A prototype pollution in the lib
A prototype pollution in the lib
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An Cross-Site Scripting (XSS) vulnerability in DeepSeek R1 through V3.1 allows a remote attacker to execute arbitrary code via unspecified input field...
An Cross-Site Scripting (XSS) vulnerability in DeepSeek R1 through V3.1 allows a remote attacker to execute arbitrary code via unspecified input fields.
Update An Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
SQL Injection vulnerability in openSIS v
SQL Injection vulnerability in openSIS v
Apply vendor patches immediately. Review database access controls and enable query logging.
Orkes Conductor v3.21.11 allows remote attackers to execute arbitrary OS commands through unrestricted access to Java classes.
Orkes Conductor v3.21.11 allows remote attackers to execute arbitrary OS commands through unrestricted access to Java classes.
Update Orkes Conductor Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
A cross-site scripting (XSS) vulnerability in Intelbras RX1500 v2
A cross-site scripting (XSS) vulnerability in Intelbras RX1500 v2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A cross-site scripting (XSS) vulnerability in Intelbras RX1500 v2
A cross-site scripting (XSS) vulnerability in Intelbras RX1500 v2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An issue in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows unauthenticated attackers to execute arbitrary code via injecting a crafted payload into...
An issue in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows unauthenticated attackers to execute arbitrary code via injecting a crafted payload into the ESSID name when creating a network.
Executive Summary:
A critical vulnerability has been identified in multiple Intelbras router models, assigned CVE-2025-26063 with a CVSS score of 9.8. This flaw allows an unauthenticated attacker to gain complete control of an affected device by simply creating a Wi-Fi network with a specially crafted name. Successful exploitation could lead to network traffic interception, denial of service, or further attacks on the internal network.
Vulnerability Details
CVE-ID: CVE-2025-26063
Affected Software: An issue in Intelbras Multiple Products
Affected Versions: Intelbras RX1500 v2.2.9 and RX3000 v1.0.11
Vulnerability: This vulnerability is a command injection flaw within the function that processes the Extended Service Set Identifier (ESSID), or Wi-Fi network name. An unauthenticated attacker with access to the device's network creation interface can submit a crafted ESSID containing arbitrary system commands. The device's software fails to properly sanitize this input, causing it to execute the injected commands with the privileges of the system, leading to remote code execution and a full compromise of the router.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, reflecting the ease of exploitation and the maximum potential impact. An attacker who successfully exploits this flaw can gain complete administrative control over the network device. This could lead to severe business disruptions, including the theft of sensitive data by sniffing all network traffic, launching denial-of-service attacks that take down the network, using the compromised router as a pivot point to attack other critical systems within the organization, or incorporating the device into a botnet for larger-scale attacks. The risk to data confidentiality, integrity, and availability is exceptionally high.
Remediation Plan
Immediate Action: The primary remediation step is to update the firmware on all affected Intelbras devices to the latest version provided by the vendor, which addresses this vulnerability. After patching, it is crucial to monitor systems for any signs of prior exploitation and to review device access and system logs for any anomalous activity related to network creation.
Proactive Monitoring: Security teams should implement monitoring rules to detect exploitation attempts. This includes scrutinizing logs for events related to the creation of new Wi-Fi networks, specifically looking for ESSID names that are unusually long or contain shell metacharacters (e.g., ;, |, &, $(, `). Monitor network traffic for unexpected outbound connections from the routers to unknown IP addresses, which could indicate a successful compromise.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date of Jul 31, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, given the critical CVSS score and the straightforward nature of the attack vector, it is highly probable that a functional exploit will be developed and released by threat actors in the near future. This vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Given the critical severity (CVSS 9.8) and the ability for an unauthenticated attacker to achieve remote code execution, this vulnerability poses an immediate and significant threat to the organization. We strongly recommend that all affected Intelbras RX1500 and RX3000 devices be patched immediately. Due to the high likelihood of future exploitation, this remediation effort should be treated as a top priority. If patching cannot be performed immediately, the compensating controls listed above must be implemented without delay to mitigate the risk of a full network compromise.
Update An issue in Intelbras Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
An access control issue in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows unauthenticated attackers to access the router's settings file and obtain...
An access control issue in Intelbras RX1500 v2.2.9 and RX3000 v1.0.11 allows unauthenticated attackers to access the router's settings file and obtain potentially sensitive information from the curren...
Executive Summary:
A critical access control vulnerability has been identified in multiple Intelbras router models. This flaw allows an unauthenticated attacker to remotely download the device's configuration file, exposing highly sensitive information such as administrative passwords and network settings. Successful exploitation could lead to a complete compromise of the network's security and integrity.
Vulnerability Details
CVE-ID: CVE-2025-26062
Affected Software: Intelbras Multiple Products
Affected Versions: RX1500 v2.2.9, RX3000 v1.0.11, and potentially other versions. See vendor advisory for a complete list.
Vulnerability: The vulnerability is an improper access control flaw within the web management interface of affected Intelbras routers. An unauthenticated attacker, with network access to the device, can bypass authentication mechanisms and directly access and download the router's settings file. This is likely achieved by navigating to a specific, unprotected URL that serves the configuration file, requiring no special privileges or user interaction. The exposed file contains sensitive data in a readable or easily decipherable format, including Wi-Fi SSIDs, pre-shared keys (passwords), and administrator credentials for the router itself.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could have a severe and direct impact on the organization's security posture. An attacker who obtains the router's configuration file can gain administrative control over the network gateway, enabling them to monitor, redirect, or block all network traffic. Specific risks include eavesdropping on sensitive communications, launching man-in-the-middle attacks, pivoting to other internal network devices, and using the compromised network to launch attacks against external targets. This could result in significant data breaches, operational disruption, and reputational damage.
Remediation Plan
Immediate Action: Immediately apply the security patches provided by Intelbras to all affected devices. Organizations should identify all vulnerable Intelbras RX1500 and RX3000 routers and upgrade their firmware to the latest version that addresses this flaw. After patching, verify that the vulnerability has been successfully remediated.
Proactive Monitoring: Security teams should actively monitor web server access logs on affected routers for any direct, unauthenticated requests to configuration file paths (e.g., requests for files ending in .cfg, .bin, or containing config in the URL). Monitor for unusual outbound traffic from the routers or signs of internal network scanning originating from the router's IP address, which could indicate a successful compromise.
Compensating Controls: If immediate patching is not feasible, implement the following controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of Jul 31, 2025, this vulnerability is not listed in the CISA Known Exploited Vulnerabilities (KEV) catalog, and there are no known public exploits available. However, given the critical CVSS score and the likely simplicity of exploitation, it is highly probable that a functional exploit will be developed and published by security researchers or malicious actors.
Analyst Recommendation
Due to the critical severity (9.8) of this vulnerability, we strongly recommend that organizations take immediate action. The risk of complete network compromise is substantial. All affected Intelbras devices must be patched on an emergency basis. While this CVE is not yet on the CISA KEV list, its high impact and low-complexity nature make it a prime target for future exploitation. Until patches are fully deployed, access to the device's management interface should be strictly limited using compensating controls as a temporary mitigation.
Update An access control issue in Intelbras Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to lack secure password...
Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to lack secure password requirements for its BIOS Supervisor and User acco...
Executive Summary:
A critical vulnerability exists in Kapsch TrafficCom Roadside Units (RSUs) due to insecure password requirements for low-level BIOS accounts. This flaw could allow an attacker to gain complete control over the affected traffic management hardware, potentially leading to significant disruption of transportation systems, manipulation of traffic data, and risks to public safety.
Vulnerability Details
CVE-ID: CVE-2025-25737
Affected Software: Kapsch TrafficCom Multiple Products
Affected Versions: RIS-9160 & RIS-9260 Roadside Units (RSUs) versions v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28
Vulnerability: The affected Kapsch TrafficCom RSUs do not enforce complexity, length, or rotation requirements for the BIOS Supervisor and User passwords. This weakness allows for the use of weak, default, or easily guessable credentials. An attacker with either physical access or, more critically, remote access to a management interface that exposes BIOS settings, could exploit this by brute-forcing or guessing the password. Successful exploitation grants the attacker privileged access to the BIOS/UEFI firmware, allowing them to alter boot sequences, disable security features, or install malicious firmware, leading to a persistent and complete compromise of the device.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could have a severe impact on business operations and public safety. As these RSUs are critical components of intelligent transportation systems (ITS), their compromise could lead to widespread traffic disruption, the transmission of false information to vehicles and traffic management centers, and potential for creating hazardous road conditions. The reputational damage to the organization and the potential for physical harm make this a high-priority risk that could also serve as an entry point for broader attacks against municipal or regional network infrastructure.
Remediation Plan
Immediate Action: Immediately apply the security updates provided by Kapsch TrafficCom to patch the affected Roadside Units to the latest recommended version. After patching, review all system and access logs for any signs of unauthorized access or anomalous activity preceding the update.
Proactive Monitoring: Implement enhanced monitoring for the affected devices. Specifically, monitor for an unusual number of failed login attempts to management interfaces, unexpected system reboots, unauthorized configuration changes (especially to boot settings), and anomalous outbound network traffic originating from the RSUs that could indicate a compromise.
Compensating Controls: If immediate patching is not feasible, implement the following controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of Aug 26, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, vulnerabilities in critical infrastructure components like RSUs are attractive targets for sophisticated threat actors. The exploit method would likely involve credential guessing or the use of default passwords, which is a common technique.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the potential for severe impact on public safety, this vulnerability requires immediate attention. We strongly recommend that organizations prioritize the deployment of the vendor-supplied patches across all affected Kapsch TrafficCom RSUs without delay. Although this CVE is not currently listed on the CISA KEV list, its critical nature warrants treating it with the highest urgency. If patching cannot be performed immediately, the compensating controls listed above should be implemented as an interim risk mitigation measure.
Update Kapsch TrafficCom Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Kapsch TrafficCom RIS-9260 RSU LEO v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to contain Android Debug Bridge (ADB) pre-install...
Kapsch TrafficCom RIS-9260 RSU LEO v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 were discovered to contain Android Debug Bridge (ADB) pre-installed (/mnt/c3platpersistent/opt/platform-tools/adb) ...
Executive Summary:
A critical vulnerability has been discovered in multiple Kapsch TrafficCom products where a powerful developer tool, the Android Debug Bridge (ADB), was left pre-installed. This oversight could allow an unauthenticated attacker with network access to gain complete administrative control over the affected traffic management systems, potentially leading to significant disruption of critical infrastructure and posing a public safety risk.
Vulnerability Details
CVE-ID: CVE-2025-25736
Affected Software: Kapsch TrafficCom Multiple Products
Affected Versions: RIS-9260 RSU LEO v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28
Vulnerability: The affected versions of the Kapsch TrafficCom Roadside Units (RSUs) were shipped with the Android Debug Bridge (ADB) binary located at /mnt/c3platpersistent/opt/platform-tools/adb. ADB is a versatile command-line tool used for debugging, and its presence on a production device constitutes a significant security risk. If the ADB service is enabled and exposed to the network (typically on TCP port 5555), an attacker can connect to the device without authentication and gain privileged shell access. This allows the attacker to execute arbitrary commands, install malicious software, access or modify sensitive data, and achieve full administrative control over the device's underlying operating system.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, reflecting the potential for complete system compromise with low attack complexity. Successful exploitation could grant an attacker full control over critical traffic infrastructure components. The consequences include the ability to manipulate traffic flow, disable safety systems, display false information, or cause widespread network outages. Such actions pose a direct threat to public safety, could lead to significant economic disruption, and may result in a loss of public trust and severe reputational damage to the operating authority.
Remediation Plan
Immediate Action: Apply the vendor-supplied security patches immediately. Per the vendor's guidance, update all affected Kapsch TrafficCom Multiple Products to the latest version, which removes the vulnerable component. Following the update, actively monitor for any residual signs of compromise and review system access logs for any suspicious activity preceding the patch.
Proactive Monitoring: Implement enhanced monitoring on network segments containing the affected devices. Specifically, monitor for and alert on any network traffic on TCP port 5555, the default port for ADB. Review device logs for unauthorized access, unexpected reboots, new running processes, or any commands indicative of shell access.
Compensating Controls: If immediate patching is not possible, implement the following controls to reduce the risk of exploitation:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date (Aug 26, 2025), there are no known public exploits or reports of this vulnerability being actively exploited in the wild. However, the nature of this vulnerability (a pre-installed debugging tool) means that developing an exploit is trivial for an attacker with network access to an exposed ADB service. Threat actors targeting critical infrastructure are likely to prioritize developing capabilities to exploit this flaw.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the potential for complete compromise of critical infrastructure, we strongly recommend that organizations prioritize patching all affected Kapsch TrafficCom devices immediately. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high severity and potential impact on public safety warrant urgent attention. If patching cannot be performed immediately, the compensating controls outlined above must be implemented as a temporary measure to mitigate the immediate risk.
Update Kapsch TrafficCom Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3
Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 was discovered to contain an unauthentic...
Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs) v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28 was discovered to contain an unauthenticated EFI shell which allows attackers to execute a...
Executive Summary:
A critical vulnerability has been discovered in specific Kapsch TrafficCom Roadside Units, essential components of traffic management systems. The flaw allows an unauthenticated attacker to gain complete, low-level control of the device before its main operating system even starts, potentially leading to a total system compromise and disruption of critical transportation infrastructure.
Vulnerability Details
CVE-ID: CVE-2025-25734
Affected Software: Kapsch TrafficCom RIS-9160 & RIS-9260 Roadside Units (RSUs)
Affected Versions: v3.2.0.829.23, v3.8.0.1119.42, and v4.6.0.1211.28
Vulnerability: The affected devices contain an unauthenticated Extensible Firmware Interface (EFI) shell. The EFI shell is a low-level command environment that runs before the primary operating system boots. An attacker with physical or remote access to the device's pre-boot environment can interrupt the normal boot sequence to access this shell without needing any credentials. From the EFI shell, an attacker can execute arbitrary commands with the highest privileges, allowing them to modify firmware, alter the bootloader, access or exfiltrate all data on the disk, or install persistent malware (e.g., a bootkit) that would be invisible to the running operating system.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, reflecting the high potential for complete system compromise with low attack complexity. Successful exploitation could lead to the full takeover of affected Roadside Units (RSUs), which are critical for traffic monitoring and control. The business impact includes severe disruption of traffic management services, potential manipulation of traffic signals or electronic signage leading to public safety risks, and the ability for attackers to use the compromised RSU as a pivot point to attack broader municipal or transportation networks. The reputational damage and potential liability from an incident affecting public infrastructure are significant.
Remediation Plan
Immediate Action: The primary remediation is to apply the vendor-supplied security patches immediately. Organizations should update Kapsch TrafficCom RIS-9160 and RIS-9260 RSUs to the latest version as recommended by the vendor. After patching, verify that the update was successful and the unauthenticated EFI shell is no longer accessible.
Proactive Monitoring: Monitor for signs of exploitation, including unexpected device reboots, unusual boot-up failures, or unauthorized changes to system configurations. Review access logs for the devices' management interfaces for any anomalous connection attempts. Network monitoring should be in place to detect unusual traffic patterns originating from the RSUs, which could indicate a compromise.
Compensating Controls: If patching cannot be performed immediately, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date (Aug 26, 2025), there is no known publicly available exploit code, and there are no reports of this vulnerability being actively exploited in the wild. However, due to the critical nature of the flaw and its location in the pre-boot environment, any exploitation would be highly targeted and difficult to detect with traditional security tools.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the severe potential impact on public safety and critical infrastructure, this vulnerability requires immediate attention. Although CVE-2025-25734 is not currently on the CISA Known Exploited Vulnerabilities (KEV) catalog, organizations must not delay remediation. We strongly recommend that all affected Kapsch TrafficCom devices be patched on an emergency basis. If immediate patching is not feasible, the compensating controls outlined above, particularly network segmentation and access restriction, must be implemented without delay to mitigate the significant risk.
Update Kapsch TrafficCom Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
FS Inc S3150-8T2F 8-Port Gigabit Ethernet L2+ Switch, 8 x Gigabit RJ45, with 2 x 1Gb SFP, Fanless
FS Inc S3150-8T2F 8-Port Gigabit Ethernet L2+ Switch, 8 x Gigabit RJ45, with 2 x 1Gb SFP, Fanless
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A command injection vulnerability in the me
A command injection vulnerability in the me
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability exists in the libxmljs 1
A vulnerability exists in the libxmljs 1
Executive Summary:
A high-severity vulnerability has been identified in multiple products from 'the' vendor, stemming from a flaw in the underlying libxmljs library used for processing XML data. Successful exploitation could allow a remote, unauthenticated attacker to access sensitive information, disrupt service availability, or potentially execute arbitrary code on affected systems.
Vulnerability Details
CVE-ID: CVE-2025-25341
Affected Software: the Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability is an XML External Entity (XXE) injection flaw within the libxmljs version 1 library. The application fails to properly disable or sanitize external entity references when parsing user-supplied XML input. An unauthenticated, remote attacker can exploit this by sending a specially crafted XML payload containing a malicious external entity declaration. When the server processes this payload, it can be forced to read and return the contents of arbitrary local files from the server's filesystem, leading to sensitive information disclosure.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation could lead to significant business disruption and data loss. An attacker could exfiltrate sensitive corporate data, including customer information, intellectual property, application source code, and system credentials. Such a data breach could result in severe reputational damage, regulatory fines for non-compliance with data protection standards, and financial losses associated with incident response and recovery.
Remediation Plan
Immediate Action: The primary and most effective remediation is to apply the security updates provided by the vendor immediately across all affected systems. After patching, it is crucial to continue monitoring for any signs of exploitation attempts by closely reviewing system and application access logs for anomalous activity.
Proactive Monitoring: Implement enhanced logging and monitoring focused on incoming XML data. Security teams should look for suspicious XML payloads containing Document Type Definition (DTD) headers or ENTITY declarations in application logs. Monitor for unusual outbound network connections from application servers, as this could indicate an attacker is using the vulnerability to perform Server-Side Request Forgery (SSRF) or exfiltrate data.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk of exploitation. Deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block XXE attack patterns. If possible, configure the application or XML parser to explicitly disable the processing of Document Type Definitions (DTDs) and external entities to prevent the vulnerability from being triggered.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 27, 2025, there are no known public proof-of-concept exploits available for this specific CVE. However, XML External Entity (XXE) is a well-documented vulnerability class, and the techniques to exploit it are widely known. It is highly probable that threat actors could develop a functional exploit with minimal effort.
Analyst Recommendation
Given the High severity rating (CVSS 7.5) and the potential for sensitive data exfiltration, we strongly recommend that organizations prioritize the immediate application of vendor-supplied security patches. Although this vulnerability is not currently listed on CISA's Known Exploited Vulnerabilities (KEV) catalog, the underlying weakness (XXE) is trivial for skilled attackers to exploit. Organizations should treat this as a critical threat and implement the recommended remediation and monitoring actions without delay to prevent a potential data breach.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
in OpenHarmony v5
in OpenHarmony v5
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Insufficient control flow management in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2
Insufficient control flow management in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configuration interface
An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configuration interface
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An unauthenticated local attacker can inject a command that is subsequently executed as root, leading to a privilege escalation
An unauthenticated local attacker can inject a command that is subsequently executed as root, leading to a privilege escalation
Update to patched version immediately. Review user permissions and access controls.
An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due t...
An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in Fortinet FortiWeb version 7.6.0 thro...
An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in Fortinet FortiWeb version 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2....
Executive Summary:
A critical SQL Injection vulnerability, identified as CVE-2025-25257, exists in multiple versions of Fortinet's FortiWeb product. This flaw allows an unauthenticated attacker to execute arbitrary SQL commands on the system, which could lead to a complete compromise of the appliance, data theft, and unauthorized system access. Due to its critical severity rating (CVSS 9.8), immediate patching is required to prevent potential exploitation.
Vulnerability Details
CVE-ID: CVE-2025-25257
Affected Software: Fortinet FortiWeb
Affected Versions: 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.x. See vendor advisory for a complete list of affected versions.
Vulnerability: The vulnerability is an improper neutralization of special elements used in an SQL command (CWE-89), commonly known as SQL Injection. The FortiWeb appliance fails to properly sanitize user-supplied input before it is processed by a back-end database. An unauthenticated remote attacker can exploit this by sending a specially crafted request to a vulnerable component, allowing them to inject and execute malicious SQL queries. Successful exploitation could grant the attacker full control over the database, enabling them to read, modify, or delete data, and potentially escalate privileges to execute commands on the underlying operating system.
Business Impact
This vulnerability presents a critical risk to the organization, reflected by its CVSS score of 9.8. Exploitation could lead to a full compromise of the FortiWeb appliance, which is a key security device. Potential consequences include the exfiltration of sensitive data that the web application firewall is meant to protect, unauthorized modification of security policies, and using the compromised device as a pivot point to attack the internal network. A successful attack could result in significant data breaches, operational downtime, reputational damage, and potential regulatory penalties.
Remediation Plan
Immediate Action: Apply the security patches provided by Fortinet to all affected FortiWeb appliances immediately. Prioritize patching for internet-facing systems. After patching, review system and access logs for any signs of compromise that may have occurred before the update was applied.
Proactive Monitoring: Actively monitor web server logs, firewall logs, and FortiWeb appliance logs for suspicious activity. Look for requests containing SQL keywords (e.g., SELECT, UNION, INSERT, '--', OR 1=1), unusual error messages from the database, or unexpected traffic originating from the FortiWeb management interface. Configure alerts for multiple failed login attempts or access from untrusted IP addresses.
Compensating Controls: If patching cannot be performed immediately, restrict access to the FortiWeb management interface to a dedicated and secure management network. Limit access to only authorized personnel and trusted IP addresses. If possible, place an additional access control list (ACL) or firewall rule upstream to filter traffic to the management interface.
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of Jul 17, 2025, there are no known public exploits available for this vulnerability. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, indicating no widespread, active exploitation has been observed. However, given the critical CVSS score and the nature of the vulnerability, threat actors are likely to develop exploit code rapidly.
Analyst Recommendation
Given the critical severity (CVSS 9.8) of this vulnerability, we strongly recommend that immediate action is taken to mitigate the risk. The primary course of action is to apply the vendor-supplied patches to all affected Fortinet FortiWeb instances without delay. If immediate patching is not feasible, implement the recommended compensating controls, particularly restricting access to the management interface, as a matter of urgency. Organizations should remain vigilant and monitor for any updates from Fortinet or CISA regarding the exploitation status of this vulnerability.
Update An improper neutralization of special elements used in an SQL command Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Deadline: August 7, 2025
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSIEM version 7.3...
An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 throu...
Executive Summary:
A critical vulnerability has been discovered in multiple versions of the Fortinet FortiSIEM product, which could allow a remote, unauthenticated attacker to execute arbitrary commands on the system. This flaw, with a CVSS score of 9.8, represents a significant risk, as successful exploitation could lead to a complete compromise of the security appliance. This would enable an attacker to steal sensitive data, disrupt security monitoring, and pivot to other systems within the network.
Vulnerability Details
CVE-ID: CVE-2025-25256
Affected Software: Fortinet FortiSIEM
Affected Versions: 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.x. See vendor advisory for a complete list of affected versions.
Vulnerability: The vulnerability is an OS Command Injection (CWE-78) flaw. It exists because a component within the FortiSIEM application fails to properly sanitize user-supplied input before passing it to the underlying operating system for execution. An unauthenticated remote attacker can craft a malicious request containing special shell characters (e.g., ;, |, &&, $(...)) to a vulnerable endpoint. The application processes this input and executes the embedded commands with the privileges of the application's service account, which could be a high-privilege user, leading to remote code execution (RCE).
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, posing an extreme risk to the organization. As FortiSIEM is a central component of an organization's security infrastructure, its compromise has severe consequences. An attacker could achieve full control over the appliance, leading to the loss of confidentiality, integrity, and availability. Specific risks include the exfiltration of sensitive log data and credentials stored on the SIEM, complete disruption of security monitoring and alerting capabilities (blinding the security team), and using the compromised system as a pivot point to launch further attacks across the internal network.
Remediation Plan
Immediate Action: The primary remediation is to apply the vendor-supplied security patches. Administrators should immediately update all affected Fortinet FortiSIEM instances to the latest secure version as recommended in the official Fortinet security advisory. After patching, verify that the update was successful and the system is operating normally.
Proactive Monitoring: Organizations should actively monitor for signs of compromise. Review FortiSIEM application logs, web server access logs, and system-level command execution logs for any requests containing shell metacharacters or unusual command strings. Monitor network traffic for unexpected outbound connections from the FortiSIEM appliance, which could indicate a reverse shell or data exfiltration. Use endpoint detection and response (EDR) tools to look for anomalous process execution or file modifications on the appliance itself.
Compensating Controls: If patching cannot be performed immediately, implement compensating controls to reduce the risk. Restrict network access to the FortiSIEM management interface to a secure, isolated network segment or a limited set of trusted IP addresses using a firewall. If possible, deploy a Web Application Firewall (WAF) with rules specifically designed to detect and block OS command injection attack patterns.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 12, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the critical severity (CVSS 9.8) and the relative simplicity of exploiting command injection flaws, it is highly likely that threat actors will develop and deploy exploits rapidly. Organizations should anticipate the release of proof-of-concept (PoC) code from security researchers in the near future.
Analyst Recommendation
Given the critical nature of this vulnerability, we strongly recommend that organizations treat its remediation as the highest priority. A compromised SIEM not only results in the loss of a critical security tool but also becomes a powerful platform for an attacker to launch further attacks. All affected FortiSIEM instances must be patched immediately. While this CVE is not currently on the CISA KEV list, its high impact score makes it a prime candidate for future inclusion. Therefore, it should be treated with the urgency of an actively exploited vulnerability. If immediate patching is not feasible, apply the recommended compensating controls and create a definitive plan to patch as soon as possible.
Update An improper neutralization of special elements used in an OS command Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
A heap-based buffer overflow vulnerability in Fortinet FortiOS 7
A heap-based buffer overflow vulnerability in Fortinet FortiOS 7
Executive Summary:
A high-severity vulnerability has been identified in multiple Fortinet products, specifically within the FortiOS 7 operating system. This flaw, a heap-based buffer overflow, could allow a remote attacker to cause a denial of service by crashing the device or potentially execute arbitrary code, leading to a complete compromise of the affected security appliance. Organizations should treat this as a critical issue requiring immediate attention to prevent potential network breaches.
Vulnerability Details
CVE-ID: CVE-2025-25249
Affected Software: Fortinet Multiple Products
Affected Versions: See vendor advisory for specific affected versions of FortiOS 7.
Vulnerability: The vulnerability is a heap-based buffer overflow. This type of memory corruption flaw occurs when a process attempts to write more data to a block of memory (a "buffer") on the heap than it is allocated to hold. An unauthenticated, remote attacker could exploit this by sending specially crafted network packets to a vulnerable service on the Fortinet device. This could overwrite adjacent memory structures, leading to unpredictable behavior, a system crash (Denial of Service), or, in a worst-case scenario, the execution of malicious code with the privileges of the affected service.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.1. Exploitation could have a significant negative impact on the business. A successful remote code execution attack would grant an adversary complete control over a core network security device, allowing them to bypass security policies, intercept or redirect network traffic, access sensitive internal networks, and use the compromised device as a pivot point for further attacks. A denial-of-service attack would disrupt all network traffic passing through the device, leading to business downtime, loss of productivity, and potential financial and reputational damage.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates released by Fortinet across all affected devices immediately. Prioritize patching on internet-facing systems. After patching, it is crucial to monitor for any signs of exploitation attempts by reviewing system and security logs for unusual activity or crash reports.
Proactive Monitoring: Implement heightened monitoring of affected Fortinet devices. Security teams should look for:
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of January 14, 2026, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, vulnerabilities in perimeter security devices like Fortinet's are high-value targets for threat actors. It is highly probable that proof-of-concept exploits will be developed and weaponized rapidly.
Analyst Recommendation
Given the high CVSS score of 8.1 and the critical function of Fortinet devices in network infrastructure, this vulnerability poses a significant risk to the organization. Although this CVE is not currently listed on the CISA KEV catalog, its characteristics make it a prime candidate for future inclusion and widespread exploitation. We strongly recommend that all affected Fortinet products are patched on an emergency basis. If patching is delayed, the compensating controls listed above should be implemented immediately to mitigate the risk of compromise.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway (SEG) in SEG prior to 2
Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway (SEG) in SEG prior to 2
Executive Summary:
A high-severity Server-Side Request Forgery (SSRF) vulnerability has been identified in the Omnissa Secure Email Gateway (SEG). This flaw could allow a remote, unauthenticated attacker to force the email gateway server to make unauthorized requests to internal network resources, potentially leading to sensitive information disclosure, internal network scanning, and further system compromise. Organizations are urged to apply the vendor-provided security patch immediately to mitigate this significant risk.
Vulnerability Details
CVE-ID: CVE-2025-25235
Affected Software: Omnissa Secure Email Gateway (SEG)
Affected Versions: All versions prior to SEG 2
Vulnerability: This vulnerability is a Server-Side Request Forgery (SSRF) flaw. An attacker can exploit this by sending a specially crafted request to the Secure Email Gateway, likely embedded within an email or through an exposed web component. The SEG server fails to properly validate a user-supplied URL before fetching it, causing the server to make a network request to an arbitrary destination chosen by the attacker. This allows the attacker to use the trusted email gateway server as a proxy to interact with systems on the internal network, which are normally not accessible from the internet.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.6. The business impact is significant due to the critical role of an email gateway, which typically resides in a network DMZ with access to both the internet and the internal corporate network. Successful exploitation could lead to the exfiltration of confidential data from internal file shares, databases, or cloud metadata services. An attacker could also use this vulnerability to scan the internal network for other vulnerable systems, pivot to other hosts, and establish a deeper foothold within the organization, posing a severe risk to data confidentiality, integrity, and overall network security.
Remediation Plan
Immediate Action: Apply the vendor-provided security update to upgrade all instances of Omnissa Secure Email Gateway (SEG) to version 2 or later. After patching, review server access logs and outbound firewall logs for any signs of compromise that may have occurred prior to remediation.
Proactive Monitoring: Security teams should actively monitor for indicators of compromise. This includes inspecting outbound network traffic from SEG servers for unusual requests to internal IP ranges (e.g., 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) or to cloud metadata endpoints (e.g., 169.254.169.254). Application logs on the SEG should be reviewed for anomalous URL requests or error messages indicating connection attempts to unexpected internal destinations.
Compensating Controls: If immediate patching is not feasible, implement strict egress filtering rules on the firewall protecting the SEG server. Block all outbound traffic from the SEG to the internal network, except for what is explicitly required for its operation (e.g., connections to specific internal mail servers). A Web Application Firewall (WAF) can also be deployed in front of the SEG to inspect and block malicious requests attempting to trigger the SSRF vulnerability.
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of August 11, 2025, there are no known public proof-of-concept exploits or reports of this vulnerability being actively exploited in the wild. However, SSRF vulnerabilities are well-understood and highly valued by attackers. Given the high CVSS score and the critical function of the affected product, it is highly probable that threat actors will develop exploits and begin scanning for vulnerable systems in the near future.
Analyst Recommendation
Given the high severity rating of 8.6 and the critical placement of the Secure Email Gateway within the network perimeter, we strongly recommend that organizations treat this vulnerability with extreme urgency. The potential for data exfiltration and internal network compromise is substantial. All vulnerable instances of Omnissa SEG should be patched immediately. Although this CVE is not currently on the CISA KEV catalog, vulnerabilities of this type are prime candidates for inclusion if widespread exploitation occurs. Proactive patching is the most effective strategy to prevent compromise.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability
Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability
Executive Summary:
A high-severity vulnerability has been discovered in Omnissa Workspace ONE UEM products, which could allow an attacker to bypass security controls and access sensitive files on the server. This flaw, known as a path traversal, could be exploited remotely to read confidential data, such as configuration files or credentials, potentially leading to a wider system compromise and data breach.
Vulnerability Details
CVE-ID: CVE-2025-25231
Affected Software: Omnissa Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is a Secondary Context Path Traversal. An attacker can exploit this by sending a specially crafted request to a vulnerable endpoint on the Workspace ONE UEM server. This request contains malicious input (e.g., ../ sequences) in a parameter that is processed in a secondary step by the application. This tricks the application into navigating outside of its intended, restricted directory, allowing the attacker to read arbitrary files from the server's file system with the privileges of the web service account.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could have a significant business impact by compromising the confidentiality and integrity of the Unified Endpoint Management (UEM) infrastructure. An attacker could gain unauthorized access to sensitive data stored on the server, including device information, user data, API keys, and internal network configurations. This could lead to a breach of corporate and personal data, compromise of managed endpoints, and provide a foothold for lateral movement within the corporate network.
Remediation Plan
Immediate Action: Apply the security updates provided by Omnissa immediately to all affected Workspace ONE UEM instances. After patching, it is crucial to monitor for any signs of exploitation attempts and thoroughly review historical access logs for suspicious activity that may have occurred before the patch was applied.
Proactive Monitoring: Security teams should monitor web server and application logs for requests containing path traversal character sequences (e.g., ../, ..%2f, ..\\, ..%5c). Pay close attention to logs for unusual file access errors or requests for sensitive system or configuration files. Monitor for any anomalous outbound network traffic from the UEM servers, which could indicate data exfiltration.
Compensating Controls: If patching cannot be performed immediately, implement a Web Application Firewall (WAF) with strict rules to detect and block path traversal attack patterns. Additionally, review and harden file system permissions for the user account running the Workspace ONE UEM web service to ensure it can only access necessary directories, limiting the impact of a potential breach.
Exploitation Status
Public Exploit Available: False (as of August 11, 2025)
Analyst Notes: As of August 11, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, given the high severity and the relative simplicity of exploiting path traversal flaws, proof-of-concept (PoC) code is likely to be developed by security researchers and threat actors in the near future. Organizations should operate under the assumption that exploitation is imminent.
Analyst Recommendation
This vulnerability presents a significant risk to the organization, threatening the security of the entire mobile device and endpoint management platform. With a CVSS score of 7.5 (High), immediate action is required to mitigate this risk. Although CVE-2025-25231 is not currently on the CISA KEV catalog, its severity demands urgent attention. We strongly recommend that system administrators prioritize the deployment of the vendor-supplied patches across all vulnerable systems without delay and verify successful implementation.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Honeywell Experion PKS and OneWireless WDM contains an Integer Underflow vulnerability in the component Control Data Access (CDA). An att...
The Honeywell Experion PKS and OneWireless WDM contains an Integer Underflow vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability...
Executive Summary:
A critical integer underflow vulnerability in Honeywell Experion PKS and OneWireless WDM systems could allow an unauthenticated, remote attacker to disrupt industrial processes or execute arbitrary code.
Vulnerability Details
CVE-ID: CVE-2025-2523
Affected Software: Honeywell Experion PKS and OneWireless WDM
Affected Versions: See vendor advisory for specific affected versions.
Vulnerability: An integer underflow vulnerability exists within the Control Data Access (CDA) component of the affected software. An unauthenticated attacker could potentially exploit this flaw, which may lead to a buffer overflow, resulting in a denial of service or arbitrary code execution.
Business Impact
With a CVSS score of 9.4 (Critical), a successful exploit could have severe consequences for industrial control environments. An attacker could disrupt or halt critical operational processes, leading to significant production loss, equipment damage, or potential safety incidents. The high score reflects the low attack complexity and lack of authentication required to compromise the system.
Remediation Plan
Immediate Action:
Administrators must update the affected Honeywell Experion PKS and OneWireless WDM products to the latest patched version as specified by the vendor to eliminate the vulnerability.
Proactive Monitoring:
Security teams should actively monitor network traffic for anomalous activity targeting the Control Data Access (CDA) service and regularly review system and access logs for any signs of exploitation.
Compensating Controls:
Implement an Intrusion Prevention System (IPS) with rules to detect and block exploitation attempts. Ensure proper network segmentation is in place to limit access to sensitive industrial control components from untrusted networks.
Exploitation Status
Public Exploit Available: Not Publicly Known
Analyst Notes: As of July 10, 2025, there is no public information indicating active exploitation of this vulnerability. However, due to the critical nature of the flaw in an industrial control system component, the potential for future exploitation is high.
Analyst Recommendation
Given the critical severity and the potential for significant operational disruption, this vulnerability poses a substantial risk to affected organizations. We strongly recommend that administrators prioritize the deployment of the vendor-supplied updates immediately. All affected Honeywell systems should be patched without delay to mitigate this threat.
Update The Honeywell Experion PKS and OneWireless WDM contains an Integer Underflow vulnerability in the component Control Data Access Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
A race condition vulnerability exists in the aVideoEncoder
A race condition vulnerability exists in the aVideoEncoder
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Honeywell Experion PKS and OneWireless WDM contains a Memory Buffer vulnerability in the component Control Data Access (CDA)
The Honeywell Experion PKS and OneWireless WDM contains a Memory Buffer vulnerability in the component Control Data Access (CDA)
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Honeywell Experion PKS contains an Uninitialized Variable in the common Epic Platform Analyzer (EPA) communications
The Honeywell Experion PKS contains an Uninitialized Variable in the common Epic Platform Analyzer (EPA) communications
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Software installed and run as a non-privileged user may conduct improper GPU system calls to subvert GPU HW to write to arbitrary physical memory page...
Software installed and run as a non-privileged user may conduct improper GPU system calls to subvert GPU HW to write to arbitrary physical memory pages
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in beeteam368 BeeTeam368 Extensi...
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in beeteam368 BeeTeam368 Extensions allows PHP Local File Inclusion. This issue af...
Executive Summary:
A critical vulnerability has been discovered in beeteam368 BeeTeam368 Extensions, assigned the highest possible severity score. This flaw allows an unauthenticated attacker on the internet to execute arbitrary code on the affected server, potentially leading to a complete system compromise, data theft, and service disruption. Immediate patching is required to mitigate this severe risk.
Vulnerability Details
CVE-ID: CVE-2025-25174
Affected Software: beeteam368 BeeTeam368 Extensions
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability is classified as an Improper Control of a Filename for an Include/Require Statement in a PHP Program, commonly known as Remote File Inclusion (RFI) and Local File Inclusion (LFI). An unauthenticated remote attacker can exploit this by crafting a special request that tricks the application into including and executing a malicious PHP file hosted on an external server. Successful exploitation results in arbitrary code execution with the permissions of the web server process, granting the attacker full control over the application and potentially the underlying server.
Business Impact
This vulnerability represents a critical risk to the organization, reflected by its maximum CVSS score of 10. A successful exploit could lead to a complete compromise of the affected server. Potential consequences include theft of sensitive data, deployment of ransomware, disruption of business operations, and the use of the compromised system as a launchpad for further attacks within the network. The reputational and financial damage resulting from such a breach could be severe.
Remediation Plan
Immediate Action: Immediately apply the security updates provided by the vendor to patch all instances of the affected beeteam368 BeeTeam386 Extensions. After patching, it is crucial to monitor for any signs of exploitation attempts by reviewing web server access logs and application logs for unusual requests, particularly those targeting PHP include/require functions.
Proactive Monitoring: Implement continuous monitoring of web server logs for requests containing URLs, external IP addresses, or file path traversal sequences (e.g., ../) in parameters. Monitor network traffic for unexpected outbound connections from the web server, which could indicate a successful RFI exploit communicating with a command-and-control server. Intrusion Detection/Prevention Systems (IDS/IPS) should be configured with signatures to detect and block RFI/LFI attack patterns.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules specifically designed to block RFI and LFI attack patterns. At the server level, review the PHP configuration (php.ini) and ensure allow_url_fopen and allow_url_include are set to Off to prevent the inclusion of remote files. Additionally, implement strict egress filtering to block the web server from making outbound connections to untrusted external hosts.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 14, 2025, there is no publicly available proof-of-concept exploit code for this vulnerability. However, vulnerabilities of this type (RFI) with a CVSS score of 10.0 are trivial to exploit and are highly sought after by threat actors. It is anticipated that attackers will reverse-engineer the patch to develop an exploit shortly after its release.
Analyst Recommendation
Due to the critical severity (CVSS 10.0) of this vulnerability, immediate action is required. This flaw allows for unauthenticated remote code execution, representing the highest level of risk. All organizations using the affected beeteam368 BeeTeam368 Extensions must prioritize applying the vendor-supplied patch immediately. Although this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its critical nature means it is a prime candidate for future inclusion and widespread exploitation.
Update Improper Control of Filename for Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in beeteam368 VidMov allows PHP...
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in beeteam368 VidMov allows PHP Local File Inclusion
Executive Summary:
A high-severity vulnerability exists in beeteam368 VidMov, identified as CVE-2025-25172, with a CVSS score of 8.1. This flaw allows an attacker to trick the application into including and executing unintended files from the local server, a technique known as Local File Inclusion (LFI). Successful exploitation could lead to unauthorized information disclosure, execution of arbitrary code, and potential full system compromise.
Vulnerability Details
CVE-ID: CVE-2025-25172
Affected Software: beeteam368 VidMov
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability is an Improper Control of a Filename for an Include/Require Statement in the application's PHP code. An attacker can exploit this by crafting a malicious request that manipulates a parameter used in a PHP include or require function. This manipulation tricks the application into including a file from the local filesystem that the attacker specifies, rather than the intended file. This could allow an attacker to read sensitive files (e.g., configuration files containing credentials, system files like /etc/passwd) or, if they can control the content of an included file (e.g., by poisoning a log file), achieve arbitrary code execution in the context of the web server.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.1. Exploitation poses a significant risk to the confidentiality, integrity, and availability of the affected application and underlying server. Potential consequences include the theft of sensitive corporate or customer data, unauthorized modification of system files, and full server compromise. A successful attack could lead to reputational damage, financial loss, and regulatory penalties depending on the data exposed.
Remediation Plan
Immediate Action: Apply vendor-supplied security updates for beeteam368 VidMov immediately to patch the vulnerability. After patching, monitor systems for any signs of post-remediation exploitation attempts and thoroughly review historical access logs for indicators of compromise that may have occurred prior to patching.
Proactive Monitoring: System administrators should actively monitor web server access logs for suspicious requests. Look for patterns indicative of LFI attacks, such as directory traversal sequences (../, ..%2f), absolute file paths in request parameters, and attempts to access common sensitive files. Monitor for unusual process execution or file access activity by the web server's user account.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:
allow_url_include is disabled and restricting file access to necessary directories using the open_basedir directive.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of August 14, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, vulnerabilities of this type (LFI) are well understood and targeted by threat actors. It is highly probable that exploits will be developed by reverse-engineering the vendor's patch.
Analyst Recommendation
Given the high CVSS score of 8.1 and the critical impact of a successful Local File Inclusion attack, we strongly recommend that organizations prioritize the immediate application of the vendor's security patches. Although this CVE is not currently on the CISA KEV list and public exploits are not yet available, the risk of exploitation is significant. If patching is delayed, the implementation of a WAF and proactive monitoring are critical to mitigate the immediate threat.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A vulnerability was found in BlueChi, a multi-node systemd service controller used in RHIVOS
A vulnerability was found in BlueChi, a multi-node systemd service controller used in RHIVOS
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper Neutralization of Input During Web Page Generation in Kibana can lead to stored Cross-Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation in Kibana can lead to stored Cross-Site Scripting (XSS)
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper Neutralization of Input During Web Page Generation in Kibana can lead to Cross-Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation in Kibana can lead to Cross-Site Scripting (XSS)
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An uncontrolled search path element vulnerability can lead to local privilege Escalation (LPE) via Insecure Directory Permissions
An uncontrolled search path element vulnerability can lead to local privilege Escalation (LPE) via Insecure Directory Permissions
Update to patched version immediately. Review user permissions and access controls.
Improper Neutralization of Input During Web Page Generation in Kibana can lead to Stored XSS via case file upload
Improper Neutralization of Input During Web Page Generation in Kibana can lead to Stored XSS via case file upload
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network
Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems
Microsoft is aware of vulnerabilities in the third party Agere Modem driver that ships natively with supported Windows operating systems
Executive Summary:
A high-severity vulnerability has been identified in a third-party modem driver that is included with Microsoft Windows operating systems. This flaw is being actively exploited by attackers and could allow them to take control of affected systems, leading to data theft or further network compromise. Due to the active exploitation and inclusion in the CISA KEV catalog, immediate patching is critical to mitigate significant security risks.
Vulnerability Details
CVE-ID: CVE-2025-24990
Affected Software: Microsoft Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability exists within the Agere Modem driver, a component shipped with supported versions of Microsoft Windows. The flaw is likely a memory corruption issue, such as a buffer overflow, which can be triggered when the driver processes specially crafted data sent to the modem interface. An attacker could exploit this vulnerability to execute arbitrary code with elevated (kernel-level) privileges, leading to a complete compromise of the underlying operating system.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.8. Successful exploitation could grant an attacker full control over an affected workstation or server, bypassing standard security controls. The potential business impact is severe and includes unauthorized access to sensitive data, deployment of ransomware, system instability, and the use of the compromised machine as a pivot point for further attacks within the network. Its inclusion in the CISA KEV catalog confirms it presents a clear and present danger to the organization.
Remediation Plan
Immediate Action: Apply the security updates released by Microsoft to all affected systems immediately. After patching, monitor systems for any signs of post-exploitation activity and review system and network access logs for anomalous behavior preceding the patch deployment.
Proactive Monitoring: Monitor for unusual driver behavior, such as unexpected crashes or restarts logged in the Windows Event Viewer. Network monitoring should focus on identifying anomalous traffic patterns associated with the modem interface. Endpoint Detection and Response (EDR) solutions should be configured to alert on suspicious processes originating from or interacting with the Agere Modem driver.
Compensating Controls: If immediate patching is not feasible, consider disabling the Agere modem device through the Windows Device Manager if it is not critical for business operations. Implement network segmentation to isolate potentially vulnerable systems and restrict their ability to communicate with critical assets, thus limiting the potential impact of a compromise.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of October 14, 2025, this vulnerability is confirmed to be actively exploited in the wild. Its inclusion in the CISA Known Exploited Vulnerabilities (KEV) catalog indicates that threat actors have developed and are currently using a functional exploit to target vulnerable systems.
Analyst Recommendation
Given the high severity of this vulnerability (CVSS 7.8) and its confirmed status as a known exploited vulnerability by CISA, we recommend immediate and urgent action. Organizations must prioritize the deployment of the vendor-supplied security patches to all affected endpoints before the CISA KEV deadline of November 3, 2025. Failure to remediate this vulnerability in a timely manner exposes the organization to a high likelihood of system compromise.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Deadline: November 3, 2025
Firebird is a relational database
Firebird is a relational database
XWiki Platform Eval Injection Vulnerability - Active in CISA KEV catalog.
XWiki Platform Eval Injection Vulnerability - Active in CISA KEV catalog.
FEDERAL DEADLINE: November 19, 2025 (21 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. FEDERAL DEADLINE: November 19, 2025 (21 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Deadline: November 19, 2025
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Improper access control for volatile memory containing boot code in Universal Boot Loader (U-Boot) before 2017
Improper access control for volatile memory containing boot code in Universal Boot Loader (U-Boot) before 2017
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the vi...
A carefully crafted request when creating a header link using the wiki markup syntax, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim
Executive Summary:
A high-severity vulnerability has been identified in multiple products from the vendor 'carefully'. An attacker can exploit this flaw by creating a specially formatted link within the wiki system, which, when viewed by a victim, executes malicious code in their web browser. This could lead to the theft of sensitive user information, account compromise, and further unauthorized actions within the application.
Vulnerability Details
CVE-ID: CVE-2025-24853
Affected Software: carefully Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This is a stored Cross-Site Scripting (XSS) vulnerability. An attacker can inject malicious JavaScript code into a header link using the application's wiki markup syntax. When a victim navigates to the page containing this malicious link, the script executes within the security context of their browser session. This allows the attacker to bypass same-origin policy controls to perform actions on behalf of the user, steal session cookies, exfiltrate data from the page, or redirect the user to a malicious website.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could lead to significant business consequences, including the compromise of user accounts and the theft of sensitive data they have access to, such as personal information, financial data, or proprietary business intelligence. This breach of confidentiality and integrity can result in direct financial loss, reputational damage, and loss of customer trust. Furthermore, a compromised user account could be used as a pivot point for launching further attacks against the organization.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor immediately across all affected products. After patching, organizations should monitor application and web server logs for any signs of past or ongoing exploitation attempts.
Proactive Monitoring: Security teams should actively monitor for indicators of compromise. Review access logs for unusual or malformed wiki markup syntax, particularly in page creation or edit events involving header links. Configure network monitoring to detect and alert on unusual outbound traffic from user endpoints to unknown domains, which could indicate data exfiltration from a successful XSS attack.
Compensating Controls: If immediate patching is not feasible, consider implementing compensating controls. Deploy a Web Application Firewall (WAF) with rules designed to detect and block common XSS attack patterns. If the application allows, enforce a strict Content Security Policy (CSP) to prevent the execution of untrusted inline scripts. As a last resort, consider temporarily disabling the wiki header link functionality or restricting wiki editing permissions to a small group of trusted administrators.
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of July 31, 2025, there are no known public proof-of-concept exploits or reports of this vulnerability being actively exploited in the wild. However, XSS vulnerabilities are commonly and quickly weaponized by threat actors after disclosure.
Analyst Recommendation
Given the High severity rating (CVSS 7.5) and the potential for account compromise and data theft, we strongly recommend that organizations prioritize the deployment of the vendor-supplied security patches. While this CVE is not currently on the CISA KEV list, its impact makes it a prime target for future exploitation. Organizations should treat this vulnerability with urgency and implement the recommended remediation and monitoring actions without delay to mitigate risk.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper privilege management for some Intel(R) CIP software before version WIN_DCA_2
Improper privilege management for some Intel(R) CIP software before version WIN_DCA_2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in printcart Printcart Web to Print Product Designe...
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in printcart Printcart Web to Print Product Designer for WooCommerce allows SQL Injection
Deserialization of Untrusted Data vulnerability in NooTheme Yogi allows Object Injection
Deserialization of Untrusted Data vulnerability in NooTheme Yogi allows Object Injection
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Deserialization of Untrusted Data vulnerability in awethemes Hillter allows Object Injection
Deserialization of Untrusted Data vulnerability in awethemes Hillter allows Object Injection
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Unrestricted Upload of File with Dangerous Type vulnerability in Made I.T. Forms allows Upload a Web Shell to a Web Server. This issue affects Forms:...
Unrestricted Upload of File with Dangerous Type vulnerability in Made I.T. Forms allows Upload a Web Shell to a Web Server. This issue affects Forms: from n/a through 2.9.0.
Executive Summary:
A critical vulnerability has been identified in the Made I.T. Forms product, which allows an unauthenticated attacker to upload a malicious file, known as a web shell. Successful exploitation gives the attacker complete control over the affected web server, potentially leading to data theft, service disruption, and further attacks into the internal network. Due to the extreme severity (CVSS 9.9), immediate remediation is required to prevent a full system compromise.
Vulnerability Details
CVE-ID: CVE-2025-24775
Affected Software: Made I.T. Forms
Affected Versions: All versions up to and including 2.9.0
Vulnerability: The vulnerability is an Unrestricted File Upload, which exists because the application's file upload functionality fails to properly validate the type of file being uploaded. An attacker can bypass security checks and upload a file containing executable code (e.g., a PHP, ASPX, or JSP script), commonly referred to as a "web shell." After a successful upload, the attacker can access the malicious file via a URL, causing the web server to execute the code and granting the attacker remote command execution on the server with the permissions of the web service account.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.9. A successful exploit results in a complete compromise of the web server's confidentiality, integrity, and availability. The business impact includes a high risk of sensitive data exfiltration (e.g., customer data, intellectual property), financial loss, and severe reputational damage. The compromised server could also be used as a pivot point to launch further attacks against the internal network, significantly expanding the scope of the breach.
Remediation Plan
Immediate Action: Immediately update the Made I.T. Forms product to the latest version available (newer than 2.9.0) as per the vendor's guidance. After patching, monitor for any signs of post-remediation exploitation attempts and conduct a thorough review of historical web server and application access logs for any indicators of compromise preceding the patch.
Proactive Monitoring: Implement monitoring for suspicious activity, including:
.../uploads/shell.php?cmd=...).Compensating Controls: If patching cannot be performed immediately, apply the following controls to mitigate risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date of August 14, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, vulnerabilities of this type and severity are prime targets for rapid exploit development by threat actors. Organizations should assume that an exploit could become publicly available at any time and act accordingly.
Analyst Recommendation
Given the critical CVSS score of 9.9 and the potential for complete system compromise, this vulnerability poses an immediate and severe threat to the organization. We strongly recommend that all systems running affected versions of Made I.T. Forms be patched immediately. Although this CVE is not currently on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high impact and the simplicity of exploitation make it an urgent priority for remediation. Do not wait for evidence of active exploitation before taking action.
Update Unrestricted Upload of File with Dangerous Type vulnerability in Made Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP Royal Themes News Magazine...
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP Royal Themes News Magazine X allows PHP Local File Inclusion
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CMSJunkie - WordPress Business Directory Plugins...
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CMSJunkie - WordPress Business Directory Plugins WP-BusinessDirectory allows Blind SQL Injection. ...
Executive Summary:
A critical vulnerability has been identified in the CMSJunkie WP-BusinessDirectory plugin for WordPress. This flaw, a Blind SQL Injection, allows a remote attacker to manipulate the website's database without needing to be an authenticated user. Successful exploitation could lead to the theft of sensitive information, such as user credentials and customer data, or a complete compromise of the affected website.
Vulnerability Details
CVE-ID: CVE-2025-24759
Affected Software: CMSJunkie WP-BusinessDirectory
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability is an Improper Neutralization of Special Elements used in an SQL Command, commonly known as a SQL Injection. The application fails to properly sanitize user-supplied input before it is used in a database query. An unauthenticated, remote attacker can craft malicious input, likely via a web form or URL parameter, to execute arbitrary SQL commands against the backend database. Because this is a "Blind" SQL Injection, the attacker does not receive direct output from the database but can infer data by sending a series of queries that result in observable differences in application response time or content, allowing them to systematically exfiltrate sensitive data.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.3. Exploitation poses a significant risk to the organization, potentially leading to a severe data breach. Consequences include the unauthorized disclosure of confidential data (e.g., user accounts, personal identifiable information, financial records), which can result in substantial reputational damage, loss of customer trust, and potential regulatory fines under data protection laws like GDPR. Depending on the database configuration, an attacker could also escalate privileges, modify or delete data, or potentially gain control over the underlying web server.
Remediation Plan
Immediate Action: Immediately update the CMSJunkie WP-BusinessDirectory plugin to the latest version provided by the vendor. After patching, review web server and database access logs for any signs of exploitation that may have occurred prior to the update.
Proactive Monitoring: Implement monitoring to detect and alert on potential exploitation attempts. Look for suspicious web requests in logs that contain SQL keywords (SELECT, UNION, SLEEP, BENCHMARK), encoded special characters, or unusually long and complex query strings. Monitor for abnormal database load or response times, which can be symptomatic of time-based blind SQL injection attacks.
Compensating Controls: If patching cannot be performed immediately, deploy a Web Application Firewall (WAF) with a strict ruleset designed to detect and block SQL injection patterns. Additionally, ensure the database user account associated with the WordPress application has the minimum necessary permissions (principle of least privilege) to limit the impact of a potential compromise. Consider disabling the plugin temporarily if it is not business-critical until patching is possible.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of July 16, 2025, there are no known public exploits specifically for this vulnerability. However, SQL injection is a well-understood vulnerability class, and threat actors can develop exploit code relatively easily. This vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Due to the critical severity (CVSS 9.3) of this vulnerability, immediate action is required. All organizations using the CMSJunkie WP-BusinessDirectory plugin must prioritize applying the vendor-supplied patch immediately to prevent a potential data breach and system compromise. While this CVE is not yet on the CISA KEV list, its high severity and the prevalence of automated scanning for SQL injection flaws make it a prime target for exploitation. Proactive patching and vigilant monitoring are essential to mitigate the significant risk this vulnerability poses to the organization.
Update Improper Neutralization of Special Elements used in an SQL Command Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical vulnerability has been identified in multiple products from the vendor "An," designated as CVE-2025-26210. This flaw, rated with a CVSS score of 9.8, allows a remote attacker to execute arbitrary code on affected systems, potentially leading to a full system compromise. Organizations are urged to apply the necessary updates immediately to prevent data breaches, service disruption, and further network intrusion.
Vulnerability Details
CVE-ID: CVE-2025-26210
Affected Software: An Multiple Products
Affected Versions: The vulnerability is confirmed in the DeepSeek component, versions R1 through V3.1. This component may be present in multiple products; see vendor advisory for a specific list of affected products.
Vulnerability: This is a severe Cross-Site Scripting (XSS) vulnerability that leads to Remote Code Execution (RCE). An unauthenticated, remote attacker can inject a malicious script into unspecified input fields of the application. When the application processes this malicious input, it results in the execution of arbitrary code on the underlying server, granting the attacker control over the system.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could have a devastating business impact, including a complete compromise of the affected server. Potential consequences include theft of sensitive corporate or customer data, deployment of ransomware, complete disruption of services running on the host, and the ability for an attacker to pivot and launch further attacks against the internal network. This poses significant financial, reputational, and operational risks to the organization.
Remediation Plan
Immediate Action:
Proactive Monitoring:
<script>,onerror=,onload=) in request parameters.Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes:
As of September 3, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, the high CVSS score and the RCE impact make it a very attractive target for threat actors. The classification as "Cross-Site Scripting" may be misleading; given the CVSS score of 9.8, this vulnerability must be treated with the same urgency as a critical Remote Code Execution (RCE) flaw.
Analyst Recommendation
Given the critical severity (CVSS 9.8) of this vulnerability and its potential for full system compromise, we strongly recommend that organizations prioritize the immediate patching of all affected systems. Although CVE-2025-26210 is not currently listed on the CISA KEV catalog, its high impact makes it a prime candidate for future exploitation. All remediation and monitoring actions should be executed without delay to mitigate the significant risk to the organization.