OpenAirInterface CN5G AMF<=v2
Description
OpenAirInterface CN5G AMF<=v2
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Search and filter 8341 vulnerabilities with AI analyst insights
OpenAirInterface CN5G AMF<=v2
OpenAirInterface CN5G AMF<=v2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Incorrect access control in the /api/v1/user endpoint of usememos memos v0
Incorrect access control in the /api/v1/user endpoint of usememos memos v0
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An issue was discovered in Wekan The Open Source kanban board system up to version 18
An issue was discovered in Wekan The Open Source kanban board system up to version 18
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An issue was discovered in Wekan The Open Source kanban board system up to version 18
An issue was discovered in Wekan The Open Source kanban board system up to version 18
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An unauthenticated Broken Function Level Authorization (BFLA) vulnerability in Newgen OmniDocs v11
An unauthenticated Broken Function Level Authorization (BFLA) vulnerability in Newgen OmniDocs v11
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and excluding, 6
The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and excluding, 6
Executive Summary:
A high-severity vulnerability has been discovered in the Service Finder Bookings plugin for WordPress, identified as CVE-2025-6574. This flaw allows an attacker to take over user accounts, including those with administrative privileges, without authentication. Successful exploitation could grant an attacker full control over the affected website, leading to data theft, website defacement, or further malicious activities.
Vulnerability Details
CVE-ID: CVE-2025-6574
Affected Software: WordPress Service Finder Bookings plugin
Affected Versions: All versions up to, and excluding, 6
Vulnerability: The vulnerability exists within the user account management functions of the Service Finder Bookings plugin. It is a privilege escalation flaw that enables an unauthenticated attacker to illegitimately take over any existing user account. The likely attack vector involves manipulating specific requests sent to the plugin, bypassing standard authentication and authorization checks, to reset or change another user's password or email address, thereby locking out the legitimate user and granting the attacker full access to the account.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit could have severe consequences for the business, granting an attacker administrative-level control over the WordPress site. This could lead to the theft of sensitive company or customer data, website defacement causing significant reputational damage, deployment of malware to attack site visitors, and complete disruption of online business operations. The compromise of an administrative account effectively hands over a critical digital asset to a malicious actor, posing direct financial, operational, and reputational risks.
Remediation Plan
Immediate Action: All administrators of WordPress sites using the Service Finder Bookings plugin must immediately update it to version 6 or newer. After updating, review all user accounts, particularly those with administrative privileges, for any signs of unauthorized changes. If the plugin is no longer required for business operations, it should be deactivated and uninstalled to reduce the overall attack surface.
Proactive Monitoring: Monitor web server and application logs for suspicious activity targeting the plugin's endpoints, especially functions related to user profile updates or password resets. Security teams should look for unusual login patterns (e.g., logins from new IP addresses or geolocations for administrator accounts), unexpected changes to user account details (email, password), and the creation of new, unauthorized administrative users.
Compensating Controls: If immediate patching is not feasible, consider implementing the following controls:
/wp-admin) to trusted IP addresses only.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 1, 2025, there are no known public proof-of-concept exploits or active attacks targeting this vulnerability. However, due to the high severity and the popularity of the WordPress platform, it is highly probable that threat actors will develop and deploy exploits in the near future.
Analyst Recommendation
Given the high CVSS score of 8.8, this vulnerability presents a significant and immediate risk to the organization. We strongly recommend that all teams responsible for WordPress websites prioritize the immediate patching of the Service Finder Bookings plugin to the latest secure version. Although this vulnerability is not currently listed on the CISA KEV catalog, its severity makes it a prime candidate for future inclusion and a high-value target for attackers. Immediate remediation is the most effective strategy to prevent a potential compromise.
Update WordPress plugin/theme to the latest version. Review WordPress security settings and remove if no longer needed.
dcat-admin v2.2.3-beta and before is vulnerable to file inclusion in admin/src/Extend/VersionManager.php.
dcat-admin v2.2.3-beta and before is vulnerable to file inclusion in admin/src/Extend/VersionManager.php.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
A denial-of-service vulnerability exists in github
A denial-of-service vulnerability exists in github
OpenSIS 9
OpenSIS 9
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
nopCommerce 4
nopCommerce 4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Insufficient validation of untrusted input in ANGLE and GPU in Google Chrome prior to 138
Insufficient validation of untrusted input in ANGLE and GPU in Google Chrome prior to 138
Executive Summary:
A high-severity vulnerability has been identified in Google Chrome which could allow a remote attacker to execute arbitrary code on a user's system. By luring a user to a specially crafted malicious website, an attacker could exploit this flaw to take control of the affected computer, potentially leading to data theft, installation of malware, or further intrusion into the network. This vulnerability presents a critical risk to endpoint security due to the widespread use of the Chrome browser.
Vulnerability Details
CVE-ID: CVE-2025-6558
Affected Software: Google Multiple Products
Affected Versions: Google Chrome versions prior to 138
Vulnerability: The vulnerability is classified as an "Insufficient validation of untrusted input" flaw within Google Chrome's ANGLE (Almost Native Graphics Layer Engine) and GPU process. An attacker can create a malicious webpage containing specially designed WebGL content. When a user with a vulnerable version of Chrome visits this page, the browser's GPU process fails to properly validate the input, leading to a memory corruption error, such as a heap buffer overflow. A successful exploit allows the attacker to bypass the browser's security sandbox and execute arbitrary code on the host operating system with the permissions of the logged-in user.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could have a significant business impact, including the compromise of sensitive corporate or personal data, the deployment of ransomware, or the establishment of a persistent foothold for lateral movement within the network. Because web browsers are a primary interface to the internet for most users, a remote code execution flaw represents a critical threat vector. A widespread compromise of employee workstations could lead to substantial financial loss, operational disruption, and severe reputational damage.
Remediation Plan
Immediate Action: Apply the security update provided by Google to all affected systems immediately. All installations of Google Chrome should be updated to version 138 or later. Utilize enterprise patch management solutions to ensure the update is deployed comprehensively across all endpoints and verify successful installation.
Proactive Monitoring: Security teams should actively monitor for signs of exploitation. This includes analyzing Endpoint Detection and Response (EDR) logs for anomalous process creation originating from chrome.exe or its child processes. Network traffic should be scrutinized for connections to unknown or suspicious command-and-control (C2) servers. Monitor system and application logs for an increase in browser or GPU process crashes, which could indicate failed exploitation attempts.
Compensating Controls: If immediate patching is not possible, organizations should implement compensating controls to reduce risk. This includes using web filtering solutions to block access to uncategorized or known malicious websites, ensuring endpoint security solutions with memory protection are enabled, and restricting user permissions to limit the impact of a potential compromise. As a temporary measure, disabling WebGL in browser settings can mitigate this specific attack vector, though it may affect the functionality of legitimate websites.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of July 15, 2025, there are no known public exploits for CVE-2025-6558. However, vulnerabilities of this type in a ubiquitous product like Chrome are prime targets for exploit development by both security researchers and malicious actors. The vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities (KEV) catalog, but organizations should monitor for changes to its status.
Analyst Recommendation
Given the high-severity CVSS score of 8.8 and the potential for remote code execution, this vulnerability poses a critical risk to the organization. We strongly recommend that the vendor-supplied patch be deployed as a top priority across all managed endpoints. Although there are no known active exploits, the ease of exploitation (requiring only a visit to a malicious site) means the window of opportunity for attackers is large. Organizations must act decisively to remediate this vulnerability to prevent potential system compromise.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Deadline: August 11, 2025
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2
A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2
A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2
A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2
A denial-of-service vulnerability exists in the omec-project UPF (pfcpiface component) in version upf-epc-pfcpiface:2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A denial-of-service vulnerability exists in the omec-upf (upf-epc-pfcpiface) in version upf-epc-pfcpiface:2
A denial-of-service vulnerability exists in the omec-upf (upf-epc-pfcpiface) in version upf-epc-pfcpiface:2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A denial-of-service vulnerability exists in the omec-project UPF (component upf-epc/pfcpiface) up to at least version upf-epc-pfcpiface:2
A denial-of-service vulnerability exists in the omec-project UPF (component upf-epc/pfcpiface) up to at least version upf-epc-pfcpiface:2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The free5GC UPF suffers from a lack of bounds checking on the SEID when processing PFCP Session Deletion Requests
The free5GC UPF suffers from a lack of bounds checking on the SEID when processing PFCP Session Deletion Requests
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An issue was discovered in function LocalNode
An issue was discovered in function LocalNode
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An issue was discovered in Open5GS 2
An issue was discovered in Open5GS 2
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Type confusion in V8 in Google Chrome prior to 138
Type confusion in V8 in Google Chrome prior to 138
Executive Summary:
A high-severity type confusion vulnerability in the V8 JavaScript engine, affecting Google Chrome and other products, is being actively exploited in the wild to achieve remote code execution.
Vulnerability Details
CVE-ID: CVE-2025-6554
Affected Software: Google Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: A type confusion flaw exists within the V8 JavaScript engine. An unauthenticated, remote attacker can exploit this by enticing a user to visit a specially crafted webpage, potentially leading to arbitrary code execution in the context of the browser.
Business Impact
Successful exploitation could allow an attacker to execute arbitrary code on a victim's machine, leading to a full system compromise. This can result in data theft, installation of ransomware, or unauthorized access to internal network resources. The High severity CVSS score of 8.1 and its inclusion in the CISA Known Exploited Vulnerabilities (KEV) catalog confirm this is a significant and active threat to organizational security.
Remediation Plan
Immediate Action: Immediately apply all available security updates from the vendor to patch the affected components. Federal agencies must comply with CISA's Binding Operational Directive (BOD) 22-01 and patch this vulnerability by the deadline of July 22, 2025.
Proactive Monitoring: Monitor endpoints for anomalous browser processes or unexpected outbound network connections. Review security logs for indicators of exploitation, such as visits to suspicious or uncategorized websites.
Compensating Controls: Ensure endpoint detection and response (EDR) solutions are in place to detect and block malicious process execution resulting from browser exploitation. Employ web filtering to block access to known malicious sites.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of July 6, 2025, this vulnerability has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, which confirms active exploitation in the wild. The lack of a publicly available exploit does not diminish the threat, as private exploits are being used in active attacks.
Analyst Recommendation
Given the confirmed active exploitation of this high-severity vulnerability, immediate action is critical. All organizations must prioritize the deployment of vendor-supplied patches across all affected systems without delay to prevent potential system compromise. Deferring this update exposes the organization to a significant and immediate risk of a security breach.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Deadline: July 22, 2025
An eval injection in the malware de-obfuscation routines of CloudLinux ai-bolit before v32
An eval injection in the malware de-obfuscation routines of CloudLinux ai-bolit before v32
Executive Summary:
A high-severity vulnerability has been discovered in the CloudLinux ai-bolit malware scanner, which could allow an attacker to execute arbitrary code and take full control of the affected server. The flaw exists within the scanner's file analysis routines, where a specially crafted malicious file can trick the scanner into running embedded commands. Successful exploitation could lead to a complete system compromise, data theft, and further intrusion into the network.
Vulnerability Details
CVE-ID: CVE-2025-65530
Affected Software: CloudLinux ai-bolit
Affected Versions: All versions prior to v32
Vulnerability: This vulnerability is an eval injection flaw within the malware de-obfuscation routines of the CloudLinux ai-bolit scanner. An attacker can craft a malicious file that, when scanned, is processed by the vulnerable de-obfuscation function. This function improperly uses an eval()-like construct to interpret the file's contents, leading to the execution of code embedded within the malicious file. To exploit this, an attacker only needs to place a crafted file on a system in a location that will be scanned by an affected version of ai-bolit, allowing for remote code execution with the privileges of the scanner process.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 8.8, posing a significant risk to the organization. Successful exploitation grants an attacker Remote Code Execution (RCE) on the server where the scanner is running, which can lead to a complete system compromise. Potential consequences include the exfiltration of sensitive data, deployment of ransomware, service disruption, and the use of the compromised server as a pivot point to attack other internal systems. This could result in severe financial loss, reputational damage, and potential regulatory non-compliance.
Remediation Plan
Immediate Action: Administrators must update CloudLinux ai-bolit to version 32 or later to patch this vulnerability. Applying the vendor-supplied security update is the most direct and effective method of remediation. In parallel, security teams should actively monitor for signs of exploitation and review historical access, system, and application logs for any suspicious activity related to file uploads or unusual process execution.
Proactive Monitoring: Monitor for unusual child processes spawned by the ai-bolit scanner process. Scrutinize web server and application logs for suspicious file uploads that may be designed to trigger the scanner. Implement network monitoring to detect unexpected outbound connections from servers running ai-bolit, which could indicate communication with an attacker's command-and-control infrastructure.
Compensating Controls: If immediate patching is not feasible, consider the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 14, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the high severity (CVSS 8.8) and the straightforward nature of eval injection vulnerabilities, it is highly probable that a functional proof-of-concept exploit will be developed and released by security researchers or malicious actors. Organizations should treat this as an imminent threat.
Analyst Recommendation
Given the high severity CVSS score of 8.8 and the potential for complete system compromise, this vulnerability poses a critical risk to the organization. We strongly recommend that all systems running affected versions of CloudLinux ai-bolit be patched immediately to version 32 or newer. Although this CVE is not currently listed in the CISA KEV catalog, its critical impact warrants urgent attention. If patching cannot be performed immediately, implement the suggested compensating controls and elevate monitoring to detect any potential exploitation attempts.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
The Ovatheme Events Manager plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the process_checkout()...
The Ovatheme Events Manager plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the process_checkout() function in all versions up to, and including, 1....
Executive Summary:
A critical vulnerability has been discovered in the Ovatheme Events Manager plugin for WordPress, identified as CVE-2025-6553. This flaw allows an unauthenticated attacker to upload malicious files to a vulnerable website, which can lead to a complete server compromise. Successful exploitation could result in data theft, website defacement, or the use of the server for further malicious activities.
Vulnerability Details
CVE-ID: CVE-2025-6553
Affected Software: The Ovatheme Events Manager plugin for WordPress
Affected Versions: All versions up to and including the version immediately preceding the patched release. See vendor advisory for specific affected versions.
Vulnerability: The vulnerability exists due to a lack of proper file type validation within the process_checkout() function of the plugin. An attacker can craft a request to this function to upload a file with a malicious extension (e.g., .php, .phtml). Because the server-side code does not adequately check the file's content or extension, it accepts the malicious file and saves it to a web-accessible directory, enabling the attacker to achieve Remote Code Execution (RCE) by simply navigating to the uploaded file's URL.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could lead to a complete compromise of the web server's confidentiality, integrity, and availability. Potential consequences include the theft of sensitive data such as customer information and payment details, website defacement causing significant reputational damage, and the server being co-opted into a botnet for distributing malware or launching attacks against other targets. The financial and operational impact of such a breach could be severe.
Remediation Plan
Immediate Action: Immediately update The Ovatheme Events Manager plugin for WordPress to the latest patched version provided by the vendor. After patching, it is crucial to monitor for any signs of post-patch exploitation attempts and thoroughly review web server access logs for any evidence of compromise prior to the update.
Proactive Monitoring: System administrators should actively monitor web server logs for unusual POST requests to the checkout function, unexpected file uploads (especially files with script extensions like .php), or requests to non-existent or suspicious files in upload directories. Implement file integrity monitoring to detect unauthorized changes to website files. Monitor for unusual outbound network traffic that could indicate a connection to a command-and-control server.
Compensating Controls: If immediate patching is not feasible, consider the following controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of October 11, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, arbitrary file upload vulnerabilities in WordPress plugins are trivial to exploit, and it is highly likely that proof-of-concept (PoC) code will be developed and released publicly in the near future.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the high potential for complete system compromise, organizations must treat this vulnerability with the highest priority. We strongly recommend applying the vendor-supplied patch immediately to all affected websites. Although this vulnerability is not currently on the CISA KEV list, its severity makes it a prime candidate for future inclusion. Following the update, a thorough security review should be conducted to hunt for any signs of pre-existing compromise.
Update The Ovatheme Events Manager plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Plesk Obsidian versions 8
Plesk Obsidian versions 8
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
A Server-Side Request Forgery (SSRF) vulnerability was discovered in the webpage-to-markdown conversion feature of markdownify-mcp v0
A Server-Side Request Forgery (SSRF) vulnerability was discovered in the webpage-to-markdown conversion feature of markdownify-mcp v0
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Use after free in endpoint destructors in Redboltz async_mqtt 10
Use after free in endpoint destructors in Redboltz async_mqtt 10
Executive Summary:
A high-severity use-after-free vulnerability has been identified in the Redboltz async_mqtt library, which is used in multiple products from the vendor "Use". This flaw can be exploited by an attacker to cause the affected application to crash, resulting in a denial of service, or potentially to execute arbitrary code on the system, leading to a full compromise.
Vulnerability Details
CVE-ID: CVE-2025-65503
Affected Software: Use Multiple Products
Affected Versions: Redboltz async_mqtt version 10. See vendor advisory for specific affected product versions.
Vulnerability: This is a use-after-free (UAF) vulnerability that exists within the endpoint destructor functions of the Redboltz async_mqtt library. A UAF condition occurs when a program attempts to access a memory location after it has been deallocated or "freed." An attacker could trigger this flaw by manipulating the lifecycle of an MQTT connection in a way that causes the application to reference a pointer to the deallocated memory associated with a connection endpoint. Successful exploitation could lead to a crash (Denial of Service) or, under specific circumstances, allow the attacker to execute arbitrary code with the privileges of the affected application.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation could have a significant business impact, depending on the role of the affected products. A successful denial-of-service attack could disrupt critical operations, leading to downtime and financial loss. If an attacker achieves arbitrary code execution, they could gain control of the affected system, potentially leading to data theft, installation of ransomware, or lateral movement across the corporate network, posing a severe risk to data confidentiality, integrity, and availability.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected systems immediately. Prioritize patching on internet-facing or mission-critical systems. After patching, monitor for any signs of exploitation attempts by reviewing application and system logs for unexpected crashes or error messages related to memory corruption.
Proactive Monitoring: Security teams should actively monitor for anomalies on systems running the affected software. This includes watching for unexpected application restarts, segmentation faults, or memory-related errors in system logs. Network monitoring should be configured to detect and alert on unusual traffic patterns or connection attempts to the services using the vulnerable library.
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the risk. Restrict network access to the vulnerable services to only trusted hosts and networks. Deploy an Intrusion Prevention System (IPS) with signatures capable of detecting and blocking exploit attempts targeting this type of memory corruption flaw. Consider isolating the affected systems in a segmented network zone to limit the potential impact of a compromise.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 24, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, memory corruption vulnerabilities are actively sought after by threat actors, and an exploit could be developed in the future.
Analyst Recommendation
Given the high severity (CVSS 7.5) and the potential for arbitrary code execution, this vulnerability poses a significant risk to the organization. The primary recommendation is to treat this as a high-priority issue and apply the vendor-supplied patches immediately. Although this vulnerability is not currently listed on the CISA KEV list, its severity warrants urgent action. If patching is delayed, the compensating controls outlined above should be implemented as an interim measure to mitigate the immediate risk.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Integer signedness error in tls_verify_call_back() in src/coap_openssl
Integer signedness error in tls_verify_call_back() in src/coap_openssl
Executive Summary:
A high-severity vulnerability exists in multiple Integer products due to an integer signedness error within the TLS certificate verification function. This flaw could allow a remote attacker to bypass security checks, potentially leading to a man-in-the-middle attack where sensitive encrypted communications are intercepted and decrypted. Organizations are urged to apply security updates immediately to prevent potential data breaches.
Vulnerability Details
CVE-ID: CVE-2025-65495
Affected Software: Integer Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability is an integer signedness error in the tls_verify_call_back() function, which is responsible for validating TLS certificates during a secure connection handshake. An attacker can craft a malicious certificate or manipulate the TLS handshake in a way that provides a specific numeric value to this function. Due to the signedness error, this value is misinterpreted by the application, causing the validation function to incorrectly return a success code when it should have failed, thereby accepting an invalid or malicious certificate. Successful exploitation allows an unauthenticated, remote attacker to impersonate a trusted server, enabling man-in-the-middle (MitM) attacks to decrypt, read, and modify otherwise secure network traffic.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could lead to a complete compromise of data confidentiality and integrity for traffic passing through affected systems. An attacker could intercept sensitive information such as user credentials, financial data, personal identifiable information (PII), and proprietary company secrets. The business risks include significant data breaches, regulatory fines, financial loss from fraud, and severe reputational damage from the loss of customer trust.
Remediation Plan
Immediate Action: The primary remediation is to apply the security updates provided by the vendor to all affected products immediately. Prioritize patching on internet-facing systems and critical internal services that rely on TLS for secure communication. After patching, monitor systems for any signs of compromise that may have occurred prior to the update and review relevant access and security logs for anomalous activity.
Proactive Monitoring: Implement enhanced monitoring on affected systems. Security teams should look for anomalies in TLS handshake patterns, unexpected certificate validation errors or successes in application logs, and connections using unusual or self-signed certificates. Network Intrusion Detection/Prevention Systems (IDS/IPS) should be updated with signatures for this vulnerability as they become available to detect and block exploitation attempts.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 24, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, because the flaw allows for the bypass of a fundamental security control (TLS validation), it is highly likely that threat actors, particularly those focused on espionage and data theft, will actively work to develop exploits.
Analyst Recommendation
This vulnerability represents a critical risk to the confidentiality and integrity of an organization's data. Given the high severity score and the potential for man-in-the-middle attacks, we strongly recommend that organizations treat this as a high-priority issue. Although CVE-2025-65495 is not currently listed in the CISA KEV catalog, its impact warrants immediate remediation. All organizations using affected Integer products should follow the vendor's guidance and apply the necessary security updates without delay. If patching is not immediately possible, the compensating controls listed above should be implemented as a temporary mitigation while a patching plan is executed.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
NULL pointer dereference in get_san_or_cn_from_cert() in src/coap_openssl
NULL pointer dereference in get_san_or_cn_from_cert() in src/coap_openssl
Executive Summary:
A high-severity vulnerability has been identified in multiple products utilizing the OpenSSL library for the CoAP protocol. An unauthenticated remote attacker can exploit this flaw by sending a specially crafted digital certificate to a vulnerable system, causing the service to crash. This results in a denial of service (DoS), making critical services unavailable to legitimate users.
Vulnerability Details
CVE-ID: CVE-2025-65494
Affected Software: Multiple products utilizing the coap_openssl library
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: This vulnerability is a NULL pointer dereference that occurs within the get_san_or_cn_from_cert() function of the src/coap_openssl component. The flaw is triggered when the function processes a specially crafted X.509 certificate that is missing certain expected fields, such as a Subject Alternative Name (SAN) or Common Name (CN). An unauthenticated remote attacker can present such a certificate during a DTLS handshake, causing the function to attempt to read from a NULL memory address, which immediately terminates the running process and results in a denial-of-service condition.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. The primary business impact is a denial of service, which can lead to the unavailability of essential services that rely on the affected CoAP-based systems. For organizations utilizing these products in IoT, industrial control systems (ICS), or other critical infrastructure, successful exploitation could cause significant operational disruption, violate service level agreements (SLAs), and result in financial and reputational damage. The ease of exploitation (requiring only a malicious certificate sent over the network) increases the risk of targeted attacks aimed at disrupting business operations.
Remediation Plan
Immediate Action: Organizations must identify all affected products within their environment and apply the security updates released by the respective vendors immediately. In parallel, security teams should begin monitoring for signs of exploitation attempts and closely review system and application logs for anomalous certificate-related activities or unexpected service crashes.
Proactive Monitoring: Monitor application and system event logs for crash events or unexpected restarts of services that utilize the coap_openssl library. Security teams should look for log entries related to certificate validation errors or the processing of malformed certificates that occur immediately before a service failure. Network monitoring should be configured to alert on unusual patterns of DTLS handshake failures or repeated connection attempts from unknown IP addresses.
Compensating Controls: If immediate patching is not feasible, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 24, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, denial-of-service vulnerabilities are often simple to weaponize once the patch is reverse-engineered. It is highly likely that a proof-of-concept (PoC) exploit will be developed and published by security researchers or threat actors in the near future.
Analyst Recommendation
Given the high severity (CVSS 7.5) of this vulnerability and its potential to cause significant service disruption, we recommend that organizations prioritize the immediate patching of all affected systems. A thorough asset inventory should be conducted to identify all products that utilize the affected coap_openssl library. While this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its high impact score warrants urgent attention. Organizations should apply vendor-supplied updates without delay and implement the recommended monitoring and compensating controls to mitigate risk until patching is complete.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
NULL pointer dereference in src/coap_openssl
NULL pointer dereference in src/coap_openssl
Executive Summary:
A high-severity vulnerability has been identified in a software component responsible for secure communications, affecting multiple products from various vendors. This flaw, a NULL pointer dereference, can be exploited by an unauthenticated remote attacker by sending a specially crafted network packet. Successful exploitation would cause the affected application or service to crash, resulting in a denial of service condition and disrupting operations.
Vulnerability Details
CVE-ID: CVE-2025-65493
Affected Software: Multiple products from various vendors that utilize the affected coap_openssl component.
Affected Versions: See vendor advisory for specific affected versions.
Vulnerability: This vulnerability is a NULL pointer dereference within the src/coap_openssl source file, which handles DTLS (Datagram Transport Layer Security) for the CoAP (Constrained Application Protocol). An unauthenticated remote attacker can trigger this flaw by sending a specifically malformed DTLS packet to a vulnerable service. When the application processes this packet, it attempts to access a memory address that has not been properly initialized (a NULL pointer), causing the process to terminate abruptly and resulting in a denial of service.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. The primary business impact is service unavailability. Successful exploitation will lead to a denial of service, rendering critical services unresponsive and potentially causing significant operational disruption, especially in IoT, industrial control, or other embedded systems where CoAP is commonly used. This can lead to loss of visibility or control over devices, interruption of data collection, and potential reputational damage if the affected service is customer-facing. Organizations must conduct a thorough inventory to identify all assets using the vulnerable component to understand the full scope of risk.
Remediation Plan
Immediate Action: Apply security updates provided by the respective product vendors immediately. Prioritize patching for internet-facing and mission-critical systems to mitigate the risk of remote exploitation. Concurrently, security teams should actively monitor for any signs of exploitation attempts and review relevant system and network access logs for anomalous activity related to CoAP/DTLS traffic.
Proactive Monitoring: Implement enhanced monitoring for services using the CoAP protocol. Security teams should look for indicators of compromise such as:
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 24, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting CVE-2025-65493. However, given that NULL pointer dereference vulnerabilities are often straightforward to trigger, it is anticipated that exploit code could be developed and released by threat actors or researchers in the near future.
Analyst Recommendation
Given the high severity (CVSS 7.5) and the potential for a complete denial of service with a single crafted packet, organizations are strongly advised to treat this vulnerability as a high priority. Although this CVE is not currently listed on the CISA KEV catalog, its broad impact across multiple products and the relative ease of exploitation warrant immediate action. Organizations should initiate their patch management and vulnerability response procedures to identify all affected assets and deploy vendor-supplied updates as soon as they become available.
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An arbitrary file rename vulnerability in the /admin/filer.php component of EasyImages 2.0 v2.8.6 and below allows attackers with Administrator privil...
An arbitrary file rename vulnerability in the /admin/filer.php component of EasyImages 2.0 v2.8.6 and below allows attackers with Administrator privileges to execute arbitrary code via injecting a crafted payload into an uploaded file name.
Executive Summary:
A critical vulnerability has been identified in EasyImages 2.0, which allows an attacker with administrator access to execute arbitrary code and achieve a full compromise of the server. This is accomplished by injecting a malicious payload into a filename using the file rename function, posing a significant risk of data theft, service disruption, and further unauthorized access into the network.
Vulnerability Details
CVE-ID: CVE-2025-65473
Affected Software: EasyImages 2.0
Affected Versions: v2.8.6 and below
Vulnerability: The vulnerability exists within the /admin/filer.php component, which handles file management operations. The file renaming function fails to properly sanitize the input for a new filename. An authenticated attacker with Administrator privileges can upload a file and then use the rename feature to change its name to include an executable extension (e.g., .php) and embed malicious server-side code. When the server processes this crafted filename, it can be tricked into creating a web shell, which the attacker can then access to execute arbitrary commands with the permissions of the web server user.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.1. Successful exploitation leads to Remote Code Execution (RCE), giving an attacker complete control over the affected web server. This could result in the theft of sensitive data, deployment of ransomware, disruption of business operations, and reputational damage. The compromised server could also be used as a staging point to launch further attacks against other systems within the organization's internal network.
Remediation Plan
Immediate Action: Update the EasyImages 2.0 application to the latest version provided by the vendor to patch the vulnerability. After patching, review web server access logs for any signs of prior exploitation attempts targeting the /admin/filer.php endpoint.
Proactive Monitoring: Monitor web server logs for unusual POST requests to /admin/filer.php, particularly those involving filenames with multiple extensions, special characters, or executable extensions (e.g., .php, .phtml, .phar). Monitor for unexpected outbound network connections or processes spawned by the web server user account, which could indicate a successful compromise.
Compensating Controls: If patching is not immediately possible, implement the following controls:
/admin/ directory by enforcing IP address whitelisting.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 11, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, exploitation requires administrator privileges, meaning an attacker must first compromise an admin account. The technical details are clear enough that a skilled attacker who has gained such access could develop a private exploit with relative ease.
Analyst Recommendation
Due to the critical severity (CVSS 9.1) and the potential for complete system compromise, organizations must treat this vulnerability with high urgency. It is strongly recommended to apply the vendor-supplied patch to all affected instances of EasyImages 2.0 immediately. If patching is delayed, implement the suggested compensating controls, especially restricting access to the administration panel and enforcing MFA. While this vulnerability is not currently on the CISA KEV list, its high impact warrants immediate and decisive remediation action.
Update An arbitrary file rename vulnerability in the Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary co...
A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handlin...
Executive Summary:
A critical remote code execution vulnerability has been identified in the H2O.ai H2O-3 platform, designated as CVE-2025-6544. This flaw allows an unauthenticated attacker to take complete control of affected systems by sending a specially crafted data request, potentially leading to data theft, system compromise, or service disruption. Due to its critical severity (CVSS 9.8) and ease of exploitation, immediate remediation is required.
Vulnerability Details
CVE-ID: CVE-2025-6544
Affected Software: h2oai/h2o-3
Affected Versions: All versions up to and including 3.46.0.8
Vulnerability: The vulnerability is a result of insecure deserialization of user-supplied data. The H2O-3 application fails to properly validate data it receives before processing it, allowing an attacker to send a malicious serialized object. When the application deserializes this object, it can trigger unintended actions, such as reading sensitive files from the server's file system or executing arbitrary commands with the permissions of the H2O-3 service account.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, indicating a high risk to the organization. Successful exploitation could lead to a complete compromise of the affected server, granting the attacker full control over the system's confidentiality, integrity, and availability. Potential consequences include exfiltration of sensitive business or customer data, deployment of ransomware, manipulation of critical data processed by the platform, and using the compromised system as a pivot point to attack other internal network resources.
Remediation Plan
Immediate Action: Immediately update all instances of h2oai/h2o-3 to a version later than 3.46.0.8 as recommended by the vendor. After patching, review system and application access logs for any signs of compromise or unusual activity preceding the update.
Proactive Monitoring: Monitor network traffic to and from affected servers for unusual patterns or payloads, which may indicate exploitation attempts. System administrators should look for unexpected process executions (e.g., shells, command interpreters) spawned by the H2O-3 service. Application logs should be monitored for deserialization errors or anomalous serialized data strings.
Compensating Controls: If immediate patching is not feasible, restrict network access to the H2O-3 application interface to only trusted IP addresses and internal networks using a firewall or Web Application Firewall (WAF). Run the H2O-3 service with the lowest possible user privileges to limit the potential impact of code execution.
Exploitation Status
Public Exploit Available: true
Analyst Notes: As of Sep 21, 2025, proof-of-concept exploit code has been publicly released. Given the critical severity and the simplicity of exploiting deserialization flaws, widespread scanning and opportunistic exploitation by threat actors is expected to begin immediately.
Analyst Recommendation
This vulnerability represents a critical and immediate threat to the organization. Due to the public availability of exploit code and the high CVSS score of 9.8, all affected h2oai/h2o-3 instances must be patched immediately. This vulnerability should be treated with the highest priority. If patching cannot be performed right away, the recommended compensating controls must be implemented as a temporary measure, and a plan for patching must be expedited.
Update A deserialization vulnerability exists in Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability - Recently added to CISA KEV.
Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability - Recently added to CISA KEV.
Executive Summary: A critical, actively exploited buffer overflow vulnerability in Citrix NetScaler ADC and Gateway allows an unauthenticated attacker to execute arbitrary code, leading to a complete system compromise.
Vulnerability Details
CVE-ID: CVE-2025-6543
Affected Software: Citrix NetScaler ADC and Gateway
Affected Versions: See vendor advisory for specific affected versions.
Vulnerability: This vulnerability is a buffer overflow within the Citrix NetScaler ADC and Gateway products. An unauthenticated, remote attacker can send a specially crafted request to a vulnerable device to trigger the overflow, which can lead to arbitrary code execution.
Business Impact
The successful exploitation of this vulnerability would result in a complete compromise of the affected gateway device. This allows an attacker to gain a foothold in the network, intercept traffic, exfiltrate sensitive data, and pivot to internal systems. The assigned CVSS score of 9.5 (Critical) and its inclusion in the CISA KEV catalog underscore the extreme risk and confirmed exploitation by threat actors.
Remediation Plan
Immediate Action: Per CISA's Binding Operational Directive (BOD) 22-01, federal agencies must apply vendor mitigations by the July 20, 2025 deadline. All organizations are strongly urged to apply vendor-supplied patches or mitigations immediately.
Proactive Monitoring: Review system logs for unexpected reboots, anomalous traffic patterns, or unrecognized processes running on the appliance. Monitor network traffic for any suspicious outbound connections from the NetScaler devices.
Compensating Controls: If patching is not immediately possible, restrict access to the appliance from untrusted IP addresses. Deploy a Web Application Firewall (WAF) with rules designed to detect and block buffer overflow exploitation attempts.
Exploitation Status
Public Exploit Available: Confirmed Active Exploitation
Analyst Notes: As of June 29, 2025, this vulnerability is listed in the CISA Known Exploited Vulnerabilities (KEV) catalog. This confirms that threat actors are actively exploiting this flaw in the wild, making remediation extremely urgent.
Analyst Recommendation
Given the critical severity, confirmed active exploitation, and the strategic network position of the affected products, this vulnerability poses a severe and immediate threat. We strongly recommend that all organizations prioritize the immediate application of vendor-supplied mitigations to all affected Citrix instances. Failure to act swiftly may result in a significant security breach.
FEDERAL DEADLINE: July 20, 2025 (16 days). Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Deadline: July 20, 2025
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
An insecure authentication mechanism in the safe_exec
An insecure authentication mechanism in the safe_exec
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Authenticated append-style command-injection Ruijie APs (AP_RGOS 11
Authenticated append-style command-injection Ruijie APs (AP_RGOS 11
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Edoc-doctor-appointment-system v1.0.1 was discovered to contain SQl injection vulnerability via the 'docid' parameter at /admin/appointment.php.
Edoc-doctor-appointment-system v1.0.1 was discovered to contain SQl injection vulnerability via the 'docid' parameter at /admin/appointment.php.
Update Unknown Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Improper input handling in /Grocery/search_products_itname.php inPuneethReddyHC event-management 1.0 permits SQL injection via the sitem_name POST par...
Improper input handling in /Grocery/search_products_itname.php inPuneethReddyHC event-management 1.0 permits SQL injection via the sitem_name POST parameter. Crafted payloads can alter query logic and disclose database contents. Exploitation may result in sensitive data disclosure and backend compromise.
Executive Summary:
A critical vulnerability has been identified in the PuneethReddyHC event-management software, which allows an unauthenticated attacker to steal sensitive information directly from the application's database. The flaw exists in a product search feature and can be easily exploited over the internet to access confidential data, potentially leading to a significant data breach and system compromise. Due to the high severity and ease of exploitation, immediate remediation is strongly advised.
Vulnerability Details
CVE-ID: CVE-2025-65354
Affected Software: PuneethReddyHC event-management
Affected Versions: Version 1.0. See vendor advisory for other potentially affected versions.
Vulnerability: The application is vulnerable to SQL injection due to improper input handling in the /Grocery/search_products_itname.php script. An attacker can submit a specially crafted SQL payload via the sitem_name POST parameter when using the product search function. The application fails to sanitize this user-supplied input, incorporating it directly into a database query, which allows the attacker's malicious SQL code to be executed by the backend database. This can be used to alter the logic of SQL queries to bypass security mechanisms, exfiltrate the entire contents of the database, modify or delete data, and in some configurations, achieve remote code execution on the database server.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, reflecting the high potential for significant business disruption and data loss. Successful exploitation could lead to a severe data breach, exposing sensitive customer information, user credentials, financial records, and other proprietary business data. Such an incident would likely result in substantial financial costs from regulatory fines (e.g., GDPR, CCPA), incident response efforts, and potential litigation. Furthermore, the reputational damage and loss of customer trust could have a lasting negative impact on the organization.
Remediation Plan
Immediate Action: Immediately update the PuneethReddyHC event-management software to the latest version provided by the vendor, which addresses this vulnerability. After patching, review web server and database access logs for any signs of exploitation attempts that may have occurred prior to remediation.
Proactive Monitoring: System administrators should actively monitor web server logs for suspicious POST requests to the /Grocery/search_products_itname.php endpoint. Specifically, look for payloads in the sitem_name parameter containing SQL syntax such as single quotes ('), comment characters (--, #), or keywords like UNION, SELECT, and SLEEP. Database logs should also be monitored for anomalous queries originating from the web application server.
Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with a ruleset configured to detect and block SQL injection attacks against this specific parameter. Additionally, ensure the application's database user account operates with the principle of least privilege, restricting its permissions to only what is absolutely necessary for application functionality, which can limit the impact of a successful exploit.
Exploitation Status
Public Exploit Available: False (as of Dec 23, 2025)
Analyst Notes: This vulnerability was publicly disclosed on December 23, 2025. While no public proof-of-concept exploit code is currently available, SQL injection is a well-understood attack vector. Threat actors can quickly develop their own exploits based on the public disclosure. There is no evidence of active exploitation in the wild at this time, but organizations should assume the risk of exploitation is high.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the direct risk of a major data breach, this vulnerability requires immediate attention. We strongly recommend that organizations identify all instances of the affected software and apply the vendor-supplied patch on an emergency basis. Although this CVE is not currently listed on the CISA KEV (Known Exploited Vulnerabilities) catalog, its severity and the ease of exploitation make it a prime target for future inclusion. Prioritizing this remediation is critical to protecting sensitive data and preventing a compromise of the backend infrastructure.
Update Improper input handling in Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
alexusmai laravel-file-manager 3.3.1 and below is vulnerable to Directory Traversal. The unzip/extraction functionality improperly allows archive cont...
alexusmai laravel-file-manager 3.3.1 and below is vulnerable to Directory Traversal. The unzip/extraction functionality improperly allows archive contents to be written to arbitrary locations on the filesystem due to insufficient validation of extraction paths.
Update alexusmai Multiple Products to the latest version. Check vendor security advisory for specific patch details. Monitor for exploitation attempts and review access logs.
Abacre Restaurant Point of Sale (POS) up to 15
Abacre Restaurant Point of Sale (POS) up to 15
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Aqara Hub devices including Camera Hub G3 4
Aqara Hub devices including Camera Hub G3 4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Multiple vulnerabilities in Aqara Hub firmware update process in the Camera Hub G3 4
Multiple vulnerabilities in Aqara Hub firmware update process in the Camera Hub G3 4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Command injection vulnerability in Aqara Hub devices including Camera Hub G3 4
Command injection vulnerability in Aqara Hub devices including Camera Hub G3 4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Aqara Hub devices including Camera Hub G3 4
Aqara Hub devices including Camera Hub G3 4
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
In ERPNext v15.83.2 and Frappe Framework v15.86.0, improper validation of uploaded SVG avatar images allows attackers to embed malicious JavaScript. T...
In ERPNext v15.83.2 and Frappe Framework v15.86.0, improper validation of uploaded SVG avatar images allows attackers to embed malicious JavaScript. The payload executes when an administrator clicks the image link to view the avatar, resulting in stored cross-site scripting (XSS). Successful exploitation may lead to account takeover, privilege escalation, or full compromise of the affected ERPNext instance.
Executive Summary:
A critical vulnerability has been identified in ERPNext and Frappe Framework that allows an attacker to embed malicious code within an uploaded user avatar image. When a privileged user, such as an administrator, views the malicious avatar, the code executes, potentially allowing the attacker to take over the administrator's account and gain full control of the ERP system. This could lead to significant data theft, operational disruption, and financial loss.
Vulnerability Details
CVE-ID: CVE-2025-65267
Affected Software: In ERPNext Multiple Products
Affected Versions: ERPNext v15.83.2, Frappe Framework v15.86.0, and potentially prior versions.
Vulnerability: The vulnerability is a stored cross-site scripting (XSS) flaw caused by improper input validation of Scalable Vector Graphics (SVG) files uploaded as user avatars. An attacker can create a malicious SVG file containing a JavaScript payload and upload it as their profile picture. The application fails to sanitize the file, storing the malicious payload on the server. The attack is triggered when a user with elevated privileges, such as an administrator, clicks the link to view the attacker's avatar, causing the embedded JavaScript to execute within the administrator's browser session, in the context of the ERPNext application.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9. Successful exploitation could have a severe impact on the business. An attacker could leverage the executed script to steal the administrator's session cookies, leading to a full account takeover. With administrative access, the attacker could escalate privileges, create rogue admin accounts, exfiltrate sensitive business data (e.g., financial records, customer PII, intellectual property), manipulate data, or deploy further malware, resulting in a full compromise of the ERPNext instance and significant reputational and financial damage.
Remediation Plan
Immediate Action:
Proactive Monitoring:
.svg extension, followed by unusual API calls or administrative actions from the same source IP.Compensating Controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of Dec 3, 2025, there are no known public exploits or active exploitation campaigns targeting this vulnerability. However, due to the straightforward nature of stored XSS in SVG files, proof-of-concept (PoC) exploits are likely to be developed by security researchers and threat actors in the near future.
Analyst Recommendation
Given the critical CVSS score of 9 and the potential for a full system compromise, this vulnerability represents a significant risk to the organization. We strongly recommend that the vendor-supplied patches be applied on an emergency basis across all affected ERPNext instances. Although this CVE is not currently listed on the CISA KEV list, its high severity warrants immediate attention. After patching, a thorough review of access and audit logs should be conducted to identify any potential compromise that may have occurred prior to remediation.
Update In ERPNext Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Use of weak credentials in emergency authentication component in Devolutions Server allows an unauthenticated attacker to bypass authentication via br...
Use of weak credentials in emergency authentication component in Devolutions Server allows an unauthenticated attacker to bypass authentication via brute forcing the short emergency codes generated by the server within a feasible timeframe
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
MooreThreads torch_musa through all versions contains an unsafe deserialization vulnerability in torch_musa.utils.compare_tool. The compare_for_single...
MooreThreads torch_musa through all versions contains an unsafe deserialization vulnerability in torch_musa.utils.compare_tool. The compare_for_single_op() and nan_inf_track_for_single_op() functions use pickle.load() on user-controlled file paths without validation, allowing arbitrary code execution. An attacker can craft a malicious pickle file that executes arbitrary Python code when loaded, enabling remote code execution with the privileges of the victim process.
Executive Summary:
A critical vulnerability has been identified in multiple MooreThreads products, designated as CVE-2025-65213. This flaw stems from unsafe deserialization, allowing an attacker to execute arbitrary code by tricking the application into loading a malicious file. Successful exploitation could lead to a complete compromise of the affected system, enabling data theft, service disruption, and further network intrusion.
Vulnerability Details
CVE-ID: CVE-2025-65213
Affected Software: MooreThreads Multiple Products
Affected Versions: All versions of torch_musa are affected. See vendor advisory for specific product versions.
Vulnerability: The vulnerability exists within the torch_musa.utils.compare_tool library used by MooreThreads products. Specifically, the compare_for_single_op() and nan_inf_track_for_single_op() functions use the Python pickle.load() method to deserialize data from files. These functions do not properly validate the source or content of the file being loaded, allowing an attacker to supply a specially crafted malicious pickle file. When the application attempts to deserialize this file, it can execute arbitrary code embedded within it, leading to remote code execution (RCE) with the permissions of the application process.
Business Impact
This vulnerability is rated as critical with a CVSS score of 9.8, reflecting the high potential for severe damage. A successful exploit could result in a complete system takeover, granting an attacker the ability to install malware, exfiltrate sensitive data, disrupt critical operations, and pivot to other systems within the network. The direct business risks include reputational damage, financial loss from operational downtime, data breach cleanup costs, and potential regulatory fines. Given that MooreThreads products are used in AI and high-performance computing, the compromise of these systems could lead to the theft of valuable intellectual property or the manipulation of critical data models.
Remediation Plan
Immediate Action: Organizations must immediately apply the security updates provided by the vendor. The primary remediation is to update all instances of affected MooreThreads products to the latest patched version. After patching, it is crucial to review system and application logs for any signs of compromise that may have occurred prior to the update.
Proactive Monitoring: Implement enhanced monitoring on systems running the affected software. Security teams should look for suspicious process execution originating from the MooreThreads application, unexpected file creation or modification in directories accessible by the application, and unusual outbound network connections from affected servers. Monitor for any logs indicating errors or unexpected behavior related to file loading or the torch_musa library.
Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce risk:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date of Dec 15, 2025, there are no known public proof-of-concept exploits or active attacks targeting this vulnerability. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, due to the critical severity and the straightforward nature of unsafe deserialization flaws, it is highly likely that threat actors will develop exploits for this vulnerability in the near future.
Analyst Recommendation
Given the critical CVSS score of 9.8, this vulnerability poses a severe and immediate risk to the organization. We strongly recommend that all affected MooreThreads products be patched on an emergency basis. All systems running this software should be considered high-priority targets for remediation. Although there is no current evidence of active exploitation, the potential for a full system compromise necessitates immediate and decisive action to prevent future attacks.
Update MooreThreads Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
An issue was discovered in NJHYST HY511 POE core before 2.1 and plugins before 0.1. The vulnerability stems from the device's insufficient cookie veri...
An issue was discovered in NJHYST HY511 POE core before 2.1 and plugins before 0.1. The vulnerability stems from the device's insufficient cookie verification, allowing an attacker to directly request the configuration file address and download the core configuration file without logging into the device management backend. By reading the corresponding username and self-decrypted MD5 password in the core configuration file, the attacker can directly log in to the backend, thereby bypassing the front-end backend login page.
Executive Summary:
A critical vulnerability has been discovered in multiple NJHYST products that allows an unauthenticated attacker to completely bypass the device's login mechanism. By directly accessing a configuration file, an attacker can retrieve administrative credentials and gain full control over the device, posing a severe risk to network security and operational integrity.
Vulnerability Details
CVE-ID: CVE-2025-65212
Affected Software: NJHYST HY511 POE core and associated plugins
Affected Versions: HY511 POE core versions before 2.1 and plugin versions before 0.1
Vulnerability: The vulnerability is an authentication bypass caused by insufficient cookie verification on the device's web management interface. An unauthenticated remote attacker can exploit this flaw by sending a direct HTTP request to the URL of the device's core configuration file. As the system does not properly validate the user's session, it grants access to the file, which contains sensitive information including the administrator username and a decryptable MD5 password hash. The attacker can then use these recovered credentials to log in to the device's management backend with full administrative privileges.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation leads to a complete compromise of the affected NJHYST device. An attacker with administrative access could reconfigure the device, disrupt network traffic, monitor communications, disable security features, or use the compromised device as a pivot point to launch further attacks against the internal network. This presents a significant risk to data confidentiality, network availability, and the overall security posture of the organization.
Remediation Plan
Immediate Action: Immediately apply the security updates provided by the vendor. Update the NJHYST HY511 POE core to version 2.1 or later and all associated plugins to version 0.1 or later to remediate this vulnerability.
Proactive Monitoring: Review web server and device access logs for any direct, unauthenticated requests to configuration file paths. Monitor for unusual login activity, especially from untrusted or unexpected IP addresses. Implement alerts for any unauthorized configuration changes on the devices.
Compensating Controls: If patching cannot be performed immediately, restrict network access to the device's management interface. Use a firewall or network access control lists (ACLs) to ensure that the interface is only accessible from a secure, isolated management network or specific, trusted administrator IP addresses.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date of January 6, 2026, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, given the simplicity of the attack vector (a direct URL request), it is highly likely that exploits will be developed and utilized by threat actors. The vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog.
Analyst Recommendation
Due to the critical severity (CVSS 9.8) and the ease of exploitation that allows for a complete system takeover without authentication, immediate action is required. We strongly recommend that organizations identify all affected NJHYST devices within their environment and prioritize the application of the vendor-supplied patches without delay. If patching is not immediately feasible, the compensating control of restricting network access to the management interface should be implemented as an urgent priority to mitigate the risk of compromise.
Update An issue was discovered in NJHYST Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
KeePassXC-Browser thru 1
KeePassXC-Browser thru 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Abis Technology BAPSIS allows Blind SQL Injectio...
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Abis Technology BAPSIS allows Blind SQL Injection.This issue affects BAPSIS: before 202510271606.
Executive Summary:
A critical vulnerability, identified as CVE-2025-6520, exists in Abis Technology BAPSIS software. This flaw, a Blind SQL Injection, could allow a remote, unauthenticated attacker to extract sensitive information from the application's database, potentially leading to a complete compromise of confidential data. Due to its critical severity rating (CVSS 9.8), immediate patching is required to prevent data breaches and system compromise.
Vulnerability Details
CVE-ID: CVE-2025-6520
Affected Software: Abis Technology BAPSIS
Affected Versions: All versions before 202510271606
Vulnerability: The vulnerability is an Improper Neutralization of Special Elements used in an SQL Command, commonly known as a Blind SQL Injection. An attacker can send specially crafted data to the application, which is then insecurely incorporated into a database query. Unlike traditional SQL injection, the application's response does not directly contain the results of the malicious query. Instead, the attacker must infer the data by observing changes in the application's behavior—such as time delays or different boolean responses (true/false)—to a series of carefully constructed queries, allowing them to slowly reconstruct database contents, modify data, or escalate privileges.
Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, posing a significant and immediate threat to the organization. Successful exploitation could lead to a catastrophic data breach, allowing an attacker to exfiltrate sensitive information such as customer data, financial records, intellectual property, and user credentials. The potential consequences include severe reputational damage, significant financial losses from regulatory fines (e.g., GDPR, CCPA), and the cost of incident response and recovery. Furthermore, compromise of the database could lead to data manipulation, disrupting business operations and undermining data integrity.
Remediation Plan
Immediate Action: Immediately update all instances of Abis Technology BAPSIS to version 202510271606 or a later version provided by the vendor. After patching, it is crucial to monitor for any signs of exploitation attempts that may have occurred prior to the update by thoroughly reviewing application and database access logs for suspicious activity.
Proactive Monitoring: Implement enhanced monitoring of web server and database logs. Look for suspicious patterns indicative of Blind SQL Injection, such as queries containing time-delay functions (e.g., SLEEP(), WAITFOR DELAY), conditional logic (CASE, IF), or an unusually high volume of similar requests from a single source IP address. A Web Application Firewall (WAF) should be configured to log and block requests matching known SQL injection signatures.
Compensating Controls: If immediate patching is not feasible, deploy a Web Application Firewall (WAF) in blocking mode with a robust ruleset specifically designed to detect and prevent SQL injection attacks. Additionally, ensure the application's database service account adheres to the principle of least privilege, restricting its permissions to only what is absolutely necessary for application functionality, thereby limiting the potential impact of a successful exploit.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date of this vulnerability (Oct 31, 2025), there is no known publicly available exploit code, and it is not reported to be under active exploitation. However, SQL injection is a well-understood vulnerability class, and proof-of-concept exploits are often developed quickly by security researchers and threat actors following public disclosure.
Analyst Recommendation
Given the critical CVSS score of 9.8, this vulnerability represents a severe risk to the organization. We strongly recommend that all affected Abis Technology BAPSIS systems are patched immediately, without delay. Although this vulnerability is not currently listed on the CISA KEV (Known Exploited Vulnerabilities) catalog, its high severity makes it a highly attractive target for attackers. Prioritize the deployment of the vendor-supplied update as the primary means of remediation to prevent potential data exfiltration and system compromise.
Update Improper Neutralization of Special Elements used in an SQL Command Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execu...
A command injection vulnerability exists in Windscribe for Linux Desktop App that allows a local user who is a member of the windscribe group to execute arbitrary commands as root via the 'adapterName' parameter of the 'changeMTU' function
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
An issue was discovered in Dynatrace OneAgent before 1
An issue was discovered in Dynatrace OneAgent before 1
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity vulnerability has been identified in multiple products from the vendor "Incorrect," stemming from an incorrect access control flaw in an API endpoint. This vulnerability could allow a remote attacker to access or manipulate user data without proper authorization, potentially leading to unauthorized information disclosure and account modification.
Vulnerability Details
CVE-ID: CVE-2025-65795
Affected Software: Incorrect Multiple Products
Affected Versions: The description explicitly mentions "v0". See vendor advisory for a complete list of affected versions.
Vulnerability: The vulnerability is an incorrect access control issue within the
/api/v1/userAPI endpoint of the affected software. The endpoint fails to adequately validate the permissions of the user making the request. A remote attacker, potentially with low privileges or even unauthenticated, could send a specially crafted API request to this endpoint to illegitimately access, modify, or delete user data that should be restricted, bypassing standard authorization mechanisms.Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could lead to significant business impacts, including the unauthorized disclosure of sensitive user information, loss of data integrity through unauthorized modification of user accounts, and potential reputational damage. Depending on the data managed by the application, a breach could also result in non-compliance with data protection regulations, leading to potential fines and legal repercussions.
Remediation Plan
Immediate Action: Organizations must immediately apply the security updates released by the vendor to patch this vulnerability. After patching, it is crucial to verify that the patch has been successfully applied and the vulnerability is no longer present. Continue to monitor systems closely for any signs of compromise.
Proactive Monitoring: Security teams should proactively monitor access logs for any anomalous activity targeting the
/api/v1/userendpoint. Specifically, look for a high volume of requests, requests originating from untrusted IP addresses, or patterns indicating attempts to enumerate or modify user data. Implementing alerting rules based on these patterns can help in the early detection of exploitation attempts.Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls. Deploy a Web Application Firewall (WAF) with a specific rule to block or restrict access to the vulnerable
/api/v1/userendpoint from untrusted sources. Additionally, enhancing network segmentation to limit access to the application server can further reduce the attack surface.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of December 8, 2025, there are no known public exploits or proof-of-concept (PoC) code available for this vulnerability. It is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, and there are no credible reports of this vulnerability being actively exploited in the wild. However, given the nature of access control flaws, targeted attacks by motivated actors remain a possibility.
Analyst Recommendation
Given the High severity rating (CVSS 7.5) and the potential for sensitive data exposure, it is strongly recommended that organizations prioritize the immediate application of the vendor-supplied security patches. Although this vulnerability is not currently listed in the CISA KEV catalog, its straightforward nature makes it a prime target for future exploitation. Proactive patching and vigilant monitoring are essential to mitigate the risk of a security breach.