home.social

#cve2025 — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cve2025, aggregated by home.social.

  1. Security Advisory Summary:
    SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
    • CVE-2025-40538 – Broken access control → system admin creation + root RCE
    • Two type confusion flaws → root code execution
    • One IDOR vulnerability → elevated execution

    Attack prerequisites:
    High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.

    Exposure landscape:
    12K+ internet-facing instances observed (Shodan)
    File transfer platforms remain ransomware-favored entry vectors

    Historical context:
    Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.

    Immediate actions:
    - Patch to 15.5.4
    - Audit privileged accounts
    - Review FTP/SFTP exposure
    - Monitor for anomalous admin creation

    Source: bleepingcomputer.com/news/secu

    Follow us for tactical advisories and vulnerability intelligence.

    Comment with your detection or hardening recommendations.

    #Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust

  2. Security Advisory Summary:
    SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
    • CVE-2025-40538 – Broken access control → system admin creation + root RCE
    • Two type confusion flaws → root code execution
    • One IDOR vulnerability → elevated execution

    Attack prerequisites:
    High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.

    Exposure landscape:
    12K+ internet-facing instances observed (Shodan)
    File transfer platforms remain ransomware-favored entry vectors

    Historical context:
    Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.

    Immediate actions:
    - Patch to 15.5.4
    - Audit privileged accounts
    - Review FTP/SFTP exposure
    - Monitor for anomalous admin creation

    Source: bleepingcomputer.com/news/secu

    Follow us for tactical advisories and vulnerability intelligence.

    Comment with your detection or hardening recommendations.

    #Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust

  3. Security Advisory Summary:
    SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
    • CVE-2025-40538 – Broken access control → system admin creation + root RCE
    • Two type confusion flaws → root code execution
    • One IDOR vulnerability → elevated execution

    Attack prerequisites:
    High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.

    Exposure landscape:
    12K+ internet-facing instances observed (Shodan)
    File transfer platforms remain ransomware-favored entry vectors

    Historical context:
    Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.

    Immediate actions:
    - Patch to 15.5.4
    - Audit privileged accounts
    - Review FTP/SFTP exposure
    - Monitor for anomalous admin creation

    Source: bleepingcomputer.com/news/secu

    Follow us for tactical advisories and vulnerability intelligence.

    Comment with your detection or hardening recommendations.

    #Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust

  4. Security Advisory Summary:
    SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
    • CVE-2025-40538 – Broken access control → system admin creation + root RCE
    • Two type confusion flaws → root code execution
    • One IDOR vulnerability → elevated execution

    Attack prerequisites:
    High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.

    Exposure landscape:
    12K+ internet-facing instances observed (Shodan)
    File transfer platforms remain ransomware-favored entry vectors

    Historical context:
    Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.

    Immediate actions:
    - Patch to 15.5.4
    - Audit privileged accounts
    - Review FTP/SFTP exposure
    - Monitor for anomalous admin creation

    Source: bleepingcomputer.com/news/secu

    Follow us for tactical advisories and vulnerability intelligence.

    Comment with your detection or hardening recommendations.

    #Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust

  5. 🚨 CVE-2025-14388: CRITICAL vuln in PhastPress (≤3.7) lets unauth attackers read files like wp-config.php using double-encoded null bytes. Patch unavailable—disable plugin, block %2500 in URLs, monitor logs! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vulnerability #CVE2025

  6. 🚨 CVE-2025-14388: CRITICAL vuln in PhastPress (≤3.7) lets unauth attackers read files like wp-config.php using double-encoded null bytes. Patch unavailable—disable plugin, block %2500 in URLs, monitor logs! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vulnerability #CVE2025

  7. 🚨 CVE-2025-14388: CRITICAL vuln in PhastPress (≤3.7) lets unauth attackers read files like wp-config.php using double-encoded null bytes. Patch unavailable—disable plugin, block %2500 in URLs, monitor logs! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vulnerability #CVE2025

  8. 🚨 CVE-2025-14388: CRITICAL vuln in PhastPress (≤3.7) lets unauth attackers read files like wp-config.php using double-encoded null bytes. Patch unavailable—disable plugin, block %2500 in URLs, monitor logs! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vulnerability #CVE2025

  9. 🚨 CVE-2025-14388: CRITICAL vuln in PhastPress (≤3.7) lets unauth attackers read files like wp-config.php using double-encoded null bytes. Patch unavailable—disable plugin, block %2500 in URLs, monitor logs! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vulnerability #CVE2025

  10. 🔎 CVE-2025-11544 (CRITICAL, CVSS 9.5): Sharp Display Solutions projectors let attackers upload unauthorized firmware—remote, no auth needed. All models vulnerable. Urgently segment, restrict, and monitor! radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #infosec #embeddedsecurity

  11. 🔎 CVE-2025-11544 (CRITICAL, CVSS 9.5): Sharp Display Solutions projectors let attackers upload unauthorized firmware—remote, no auth needed. All models vulnerable. Urgently segment, restrict, and monitor! radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #infosec #embeddedsecurity

  12. 🔎 CVE-2025-11544 (CRITICAL, CVSS 9.5): Sharp Display Solutions projectors let attackers upload unauthorized firmware—remote, no auth needed. All models vulnerable. Urgently segment, restrict, and monitor! radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #infosec #embeddedsecurity

  13. 🔎 CVE-2025-11544 (CRITICAL, CVSS 9.5): Sharp Display Solutions projectors let attackers upload unauthorized firmware—remote, no auth needed. All models vulnerable. Urgently segment, restrict, and monitor! radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #infosec #embeddedsecurity

  14. 🔴 CVE-2025-11545: CRITICAL vuln in all Sharp projectors—embedded HTTP server leaks sensitive info, enables unauth’d remote actions. Network access only! Segment, restrict HTTP, monitor for abuse. Patch ASAP when available. radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #IoTSecurity

  15. 🔴 CVE-2025-11545: CRITICAL vuln in all Sharp projectors—embedded HTTP server leaks sensitive info, enables unauth’d remote actions. Network access only! Segment, restrict HTTP, monitor for abuse. Patch ASAP when available. radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #IoTSecurity

  16. 🔴 CVE-2025-11545: CRITICAL vuln in all Sharp projectors—embedded HTTP server leaks sensitive info, enables unauth’d remote actions. Network access only! Segment, restrict HTTP, monitor for abuse. Patch ASAP when available. radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #IoTSecurity

  17. 🔴 CVE-2025-11545: CRITICAL vuln in all Sharp projectors—embedded HTTP server leaks sensitive info, enables unauth’d remote actions. Network access only! Segment, restrict HTTP, monitor for abuse. Patch ASAP when available. radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #IoTSecurity

  18. 🚨 CVE-2025-15016: CRITICAL flaw in Ragic Enterprise Cloud Database. Hard-coded crypto key enables remote, unauthenticated access as any user. Audit & restrict access urgently. No patch yet—mitigate now! radar.offseq.com/threat/cve-20 #OffSeq #CloudSecurity #Vulnerability #CVE2025

  19. 🚨 CVE-2025-15016: CRITICAL flaw in Ragic Enterprise Cloud Database. Hard-coded crypto key enables remote, unauthenticated access as any user. Audit & restrict access urgently. No patch yet—mitigate now! radar.offseq.com/threat/cve-20 #OffSeq #CloudSecurity #Vulnerability #CVE2025

  20. 🚨 CVE-2025-15016: CRITICAL flaw in Ragic Enterprise Cloud Database. Hard-coded crypto key enables remote, unauthenticated access as any user. Audit & restrict access urgently. No patch yet—mitigate now! radar.offseq.com/threat/cve-20 #OffSeq #CloudSecurity #Vulnerability #CVE2025

  21. 🚨 CVE-2025-15016: CRITICAL flaw in Ragic Enterprise Cloud Database. Hard-coded crypto key enables remote, unauthenticated access as any user. Audit & restrict access urgently. No patch yet—mitigate now! radar.offseq.com/threat/cve-20 #OffSeq #CloudSecurity #Vulnerability #CVE2025

  22. 🎯 Threat Intelligence
    ===================

    Executive summary: The ProjectDiscovery year-in-review highlights a small set of high-impact vulnerabilities that drove exploitation behaviour across 2025. Public disclosure, rapid PoCs, and immediate scanning activity shrank the window between advisories and operational exploitation for issues offering unauthenticated access, reliable RCE, or broad reach.

    Technical details:
    • CVE-2025-55182 — React Server Components deserialization flaw (branded React2Shell). The bug enabled unauthenticated remote code execution at framework level, increasing the number of viable targets across internal, staging, and production applications.
    • CVE-2025-31324 — SAP NetWeaver Visual Composer Metadata Uploader lacked authentication, allowing direct upload of JSP web shells and immediate code execution in affected deployments.
    • Additional notable mentions in the report include CVE-2025-0108 (PAN-OS authentication bypass), CVE-2025-20188 (Cisco IOS XE hardcoded JWT), and CVE-2025-32433 (Erlang/OTP SSH RCE).

    Analysis:
    • Attackers prioritized practicality over novelty: unauthenticated flaws and RCE at scale provided predictable, high-value access paths (e.g., SAP systems leading to enterprise-wide impact).
    • Framework-level flaws (React2Shell) blurred the boundary between application internals and external attack surface, making many otherwise non-exposed apps exploitable.
    • Exploitation progressed through observable phases: perimeter device compromise, runtime/software exposure, ubiquity as multiplier, and finally developer/update infrastructure targeting.

    Detection:
    • Community detection work and exposure scanning (including public Nuclei templates) were primary signals cited for tracking exploitation. Example template reference: Nuclei template: CVE-2025-55182.
    • Observable indicators included rapid, high-volume scanning for framework-specific endpoints and attempts to upload/execute web shell artifacts against upload endpoints.

    Mitigation and defender takeaways (reported):
    • The year demonstrated narrowing disclosure-to-exploit windows and emphasized treating widely deployed frameworks as part of the external attack surface.
    • Incident response priorities shifted toward faster detection of scanning/exploitation activity and inventorying framework exposure across environments.

    References:
    • ProjectDiscovery: Year in Review: The Vulnerabilities That Defined 2025 • CVE-2025-55182, CVE-2025-31324, CVE-2025-0108, CVE-2025-20188, CVE-2025-32433

    🔹 React2Shell #CVE2025 #SAPNetWeaver #Nuclei #ThreatIntel

    🔗 Source: projectdiscovery.io/blog/year-

  23. 🎯 Threat Intelligence
    ===================

    Executive summary: The ProjectDiscovery year-in-review highlights a small set of high-impact vulnerabilities that drove exploitation behaviour across 2025. Public disclosure, rapid PoCs, and immediate scanning activity shrank the window between advisories and operational exploitation for issues offering unauthenticated access, reliable RCE, or broad reach.

    Technical details:
    • CVE-2025-55182 — React Server Components deserialization flaw (branded React2Shell). The bug enabled unauthenticated remote code execution at framework level, increasing the number of viable targets across internal, staging, and production applications.
    • CVE-2025-31324 — SAP NetWeaver Visual Composer Metadata Uploader lacked authentication, allowing direct upload of JSP web shells and immediate code execution in affected deployments.
    • Additional notable mentions in the report include CVE-2025-0108 (PAN-OS authentication bypass), CVE-2025-20188 (Cisco IOS XE hardcoded JWT), and CVE-2025-32433 (Erlang/OTP SSH RCE).

    Analysis:
    • Attackers prioritized practicality over novelty: unauthenticated flaws and RCE at scale provided predictable, high-value access paths (e.g., SAP systems leading to enterprise-wide impact).
    • Framework-level flaws (React2Shell) blurred the boundary between application internals and external attack surface, making many otherwise non-exposed apps exploitable.
    • Exploitation progressed through observable phases: perimeter device compromise, runtime/software exposure, ubiquity as multiplier, and finally developer/update infrastructure targeting.

    Detection:
    • Community detection work and exposure scanning (including public Nuclei templates) were primary signals cited for tracking exploitation. Example template reference: Nuclei template: CVE-2025-55182.
    • Observable indicators included rapid, high-volume scanning for framework-specific endpoints and attempts to upload/execute web shell artifacts against upload endpoints.

    Mitigation and defender takeaways (reported):
    • The year demonstrated narrowing disclosure-to-exploit windows and emphasized treating widely deployed frameworks as part of the external attack surface.
    • Incident response priorities shifted toward faster detection of scanning/exploitation activity and inventorying framework exposure across environments.

    References:
    • ProjectDiscovery: Year in Review: The Vulnerabilities That Defined 2025 • CVE-2025-55182, CVE-2025-31324, CVE-2025-0108, CVE-2025-20188, CVE-2025-32433

    🔹 React2Shell #CVE2025 #SAPNetWeaver #Nuclei #ThreatIntel

    🔗 Source: projectdiscovery.io/blog/year-

  24. 🚨 CVE-2025-68398: CRITICAL vuln in Weblate (<5.15.1). Privileged users can overwrite Git configs, risking full system compromise. Patch to 5.15.1+ & audit Git settings now! radar.offseq.com/threat/cve-20 #OffSeq #Weblate #Infosec #CVE2025

  25. 🚨 CVE-2025-68398: CRITICAL vuln in Weblate (<5.15.1). Privileged users can overwrite Git configs, risking full system compromise. Patch to 5.15.1+ & audit Git settings now! radar.offseq.com/threat/cve-20 #OffSeq #Weblate #Infosec #CVE2025

  26. 🚨 CVE-2025-68398: CRITICAL vuln in Weblate (<5.15.1). Privileged users can overwrite Git configs, risking full system compromise. Patch to 5.15.1+ & audit Git settings now! radar.offseq.com/threat/cve-20 #OffSeq #Weblate #Infosec #CVE2025

  27. 🚨 CVE-2025-68398: CRITICAL vuln in Weblate (<5.15.1). Privileged users can overwrite Git configs, risking full system compromise. Patch to 5.15.1+ & audit Git settings now! radar.offseq.com/threat/cve-20 #OffSeq #Weblate #Infosec #CVE2025

  28. 🚨 CVE-2025-68398: CRITICAL vuln in Weblate (<5.15.1). Privileged users can overwrite Git configs, risking full system compromise. Patch to 5.15.1+ & audit Git settings now! radar.offseq.com/threat/cve-20 #OffSeq #Weblate #Infosec #CVE2025

  29. ⚠️ CRITICAL: CVE-2025-47372 impacts Qualcomm Snapdragon (many models). Classic buffer overflow via oversized ELF files causes memory corruption—no auth required. Security teams: review exposure & monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Snapdragon #CVE2025

  30. ⚠️ CRITICAL: CVE-2025-47372 impacts Qualcomm Snapdragon (many models). Classic buffer overflow via oversized ELF files causes memory corruption—no auth required. Security teams: review exposure & monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Snapdragon #CVE2025

  31. ⚠️ CRITICAL: CVE-2025-47372 impacts Qualcomm Snapdragon (many models). Classic buffer overflow via oversized ELF files causes memory corruption—no auth required. Security teams: review exposure & monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Snapdragon #CVE2025

  32. ⚠️ CRITICAL: CVE-2025-47372 impacts Qualcomm Snapdragon (many models). Classic buffer overflow via oversized ELF files causes memory corruption—no auth required. Security teams: review exposure & monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Snapdragon #CVE2025

  33. ⚠️ HIGH severity: CVE-2025-11924 impacts Ninja Forms (WordPress), letting unauthenticated attackers access form data via REST API. Patch 3.13.1 is ineffective. Restrict API, audit tokens, and monitor logs. More info: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE2025 #Security

  34. ⚠️ HIGH severity: CVE-2025-11924 impacts Ninja Forms (WordPress), letting unauthenticated attackers access form data via REST API. Patch 3.13.1 is ineffective. Restrict API, audit tokens, and monitor logs. More info: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE2025 #Security

  35. ⚠️ HIGH severity: CVE-2025-11924 impacts Ninja Forms (WordPress), letting unauthenticated attackers access form data via REST API. Patch 3.13.1 is ineffective. Restrict API, audit tokens, and monitor logs. More info: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE2025 #Security

  36. ⚠️ HIGH severity: CVE-2025-11924 impacts Ninja Forms (WordPress), letting unauthenticated attackers access form data via REST API. Patch 3.13.1 is ineffective. Restrict API, audit tokens, and monitor logs. More info: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE2025 #Security

  37. 🚨 CRITICAL: CVE-2025-13955 in EZCast Pro II v1.17478.146 — Predictable default Wi-Fi password lets attackers nearby calculate access credentials. Review your AP configs & restrict access. More info: radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #IoTSecurity #Infosec

  38. 🚨 CRITICAL: CVE-2025-13955 in EZCast Pro II v1.17478.146 — Predictable default Wi-Fi password lets attackers nearby calculate access credentials. Review your AP configs & restrict access. More info: radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #IoTSecurity #Infosec

  39. 🚨 CRITICAL: CVE-2025-13955 in EZCast Pro II v1.17478.146 — Predictable default Wi-Fi password lets attackers nearby calculate access credentials. Review your AP configs & restrict access. More info: radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #IoTSecurity #Infosec

  40. 🚨 CRITICAL: CVE-2025-13955 in EZCast Pro II v1.17478.146 — Predictable default Wi-Fi password lets attackers nearby calculate access credentials. Review your AP configs & restrict access. More info: radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #IoTSecurity #Infosec

  41. Cal.com has patched a critical authentication bypass (CVE-2025-66489) that allowed attackers to submit any non-empty TOTP field and skip password checks. Versions ≤5.9.7 were impacted.

    Update to 5.9.8 to ensure both password and TOTP verification are enforced.
    How should MFA implementations be validated to prevent logic gaps like this?

    Source: gbhackers.com/critical-cal-com

    Share your insights and follow us for more security reporting.

    #infosec #appsec #CVE2025 #authentication #MFA #ThreatIntel #SecureCoding #SoftwareSecurity #VulnerabilityManagement #SecurityUpdate

  42. Cal.com has patched a critical authentication bypass (CVE-2025-66489) that allowed attackers to submit any non-empty TOTP field and skip password checks. Versions ≤5.9.7 were impacted.

    Update to 5.9.8 to ensure both password and TOTP verification are enforced.
    How should MFA implementations be validated to prevent logic gaps like this?

    Source: gbhackers.com/critical-cal-com

    Share your insights and follow us for more security reporting.

    #infosec #appsec #CVE2025 #authentication #MFA #ThreatIntel #SecureCoding #SoftwareSecurity #VulnerabilityManagement #SecurityUpdate

  43. Cal.com has patched a critical authentication bypass (CVE-2025-66489) that allowed attackers to submit any non-empty TOTP field and skip password checks. Versions ≤5.9.7 were impacted.

    Update to 5.9.8 to ensure both password and TOTP verification are enforced.
    How should MFA implementations be validated to prevent logic gaps like this?

    Source: gbhackers.com/critical-cal-com

    Share your insights and follow us for more security reporting.

    #infosec #appsec #CVE2025 #authentication #MFA #ThreatIntel #SecureCoding #SoftwareSecurity #VulnerabilityManagement #SecurityUpdate

  44. Cal.com has patched a critical authentication bypass (CVE-2025-66489) that allowed attackers to submit any non-empty TOTP field and skip password checks. Versions ≤5.9.7 were impacted.

    Update to 5.9.8 to ensure both password and TOTP verification are enforced.
    How should MFA implementations be validated to prevent logic gaps like this?

    Source: gbhackers.com/critical-cal-com

    Share your insights and follow us for more security reporting.

    #infosec #appsec #CVE2025 #authentication #MFA #ThreatIntel #SecureCoding #SoftwareSecurity #VulnerabilityManagement #SecurityUpdate