#cve2025 — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #cve2025, aggregated by home.social.
-
Security Advisory Summary:
SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
• CVE-2025-40538 – Broken access control → system admin creation + root RCE
• Two type confusion flaws → root code execution
• One IDOR vulnerability → elevated executionAttack prerequisites:
High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.Exposure landscape:
12K+ internet-facing instances observed (Shodan)
File transfer platforms remain ransomware-favored entry vectorsHistorical context:
Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.Immediate actions:
- Patch to 15.5.4
- Audit privileged accounts
- Review FTP/SFTP exposure
- Monitor for anomalous admin creationFollow us for tactical advisories and vulnerability intelligence.
Comment with your detection or hardening recommendations.
#Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust
-
Security Advisory Summary:
SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
• CVE-2025-40538 – Broken access control → system admin creation + root RCE
• Two type confusion flaws → root code execution
• One IDOR vulnerability → elevated executionAttack prerequisites:
High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.Exposure landscape:
12K+ internet-facing instances observed (Shodan)
File transfer platforms remain ransomware-favored entry vectorsHistorical context:
Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.Immediate actions:
- Patch to 15.5.4
- Audit privileged accounts
- Review FTP/SFTP exposure
- Monitor for anomalous admin creationFollow us for tactical advisories and vulnerability intelligence.
Comment with your detection or hardening recommendations.
#Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust
-
Security Advisory Summary:
SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
• CVE-2025-40538 – Broken access control → system admin creation + root RCE
• Two type confusion flaws → root code execution
• One IDOR vulnerability → elevated executionAttack prerequisites:
High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.Exposure landscape:
12K+ internet-facing instances observed (Shodan)
File transfer platforms remain ransomware-favored entry vectorsHistorical context:
Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.Immediate actions:
- Patch to 15.5.4
- Audit privileged accounts
- Review FTP/SFTP exposure
- Monitor for anomalous admin creationFollow us for tactical advisories and vulnerability intelligence.
Comment with your detection or hardening recommendations.
#Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust
-
Security Advisory Summary:
SolarWinds Serv-U 15.5.4 patches four critical vulnerabilities:
• CVE-2025-40538 – Broken access control → system admin creation + root RCE
• Two type confusion flaws → root code execution
• One IDOR vulnerability → elevated executionAttack prerequisites:
High-privileged access required. Exploitation likely via credential compromise or chained privilege escalation.Exposure landscape:
12K+ internet-facing instances observed (Shodan)
File transfer platforms remain ransomware-favored entry vectorsHistorical context:
Prior Serv-U CVEs exploited by ransomware groups and state-aligned actors.Immediate actions:
- Patch to 15.5.4
- Audit privileged accounts
- Review FTP/SFTP exposure
- Monitor for anomalous admin creationFollow us for tactical advisories and vulnerability intelligence.
Comment with your detection or hardening recommendations.
#Infosec #SolarWinds #ThreatIntel #CVE2025 #RCE #PrivilegeEscalation #BlueTeam #SecurityEngineering #AttackSurface #ZeroTrust
-
All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)
https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
#HackerNews #LangGrinch #LangChain #CVE2025 #cybersecurity #secrets
-
All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)
https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
#HackerNews #LangGrinch #LangChain #CVE2025 #cybersecurity #secrets
-
All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)
https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
#HackerNews #LangGrinch #LangChain #CVE2025 #cybersecurity #secrets
-
All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)
https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
#HackerNews #LangGrinch #LangChain #CVE2025 #cybersecurity #secrets
-
All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)
https://cyata.ai/blog/langgrinch-langchain-core-cve-2025-68664/
#HackerNews #LangGrinch #LangChain #CVE2025 #cybersecurity #secrets
-
🚨 CVE-2025-14388: CRITICAL vuln in PhastPress (≤3.7) lets unauth attackers read files like wp-config.php using double-encoded null bytes. Patch unavailable—disable plugin, block %2500 in URLs, monitor logs! https://radar.offseq.com/threat/cve-2025-14388-cwe-158-improper-neutralization-of--469918d2 #OffSeq #WordPress #Vulnerability #CVE2025
-
🚨 CVE-2025-14388: CRITICAL vuln in PhastPress (≤3.7) lets unauth attackers read files like wp-config.php using double-encoded null bytes. Patch unavailable—disable plugin, block %2500 in URLs, monitor logs! https://radar.offseq.com/threat/cve-2025-14388-cwe-158-improper-neutralization-of--469918d2 #OffSeq #WordPress #Vulnerability #CVE2025
-
🚨 CVE-2025-14388: CRITICAL vuln in PhastPress (≤3.7) lets unauth attackers read files like wp-config.php using double-encoded null bytes. Patch unavailable—disable plugin, block %2500 in URLs, monitor logs! https://radar.offseq.com/threat/cve-2025-14388-cwe-158-improper-neutralization-of--469918d2 #OffSeq #WordPress #Vulnerability #CVE2025
-
🚨 CVE-2025-14388: CRITICAL vuln in PhastPress (≤3.7) lets unauth attackers read files like wp-config.php using double-encoded null bytes. Patch unavailable—disable plugin, block %2500 in URLs, monitor logs! https://radar.offseq.com/threat/cve-2025-14388-cwe-158-improper-neutralization-of--469918d2 #OffSeq #WordPress #Vulnerability #CVE2025
-
🚨 CVE-2025-14388: CRITICAL vuln in PhastPress (≤3.7) lets unauth attackers read files like wp-config.php using double-encoded null bytes. Patch unavailable—disable plugin, block %2500 in URLs, monitor logs! https://radar.offseq.com/threat/cve-2025-14388-cwe-158-improper-neutralization-of--469918d2 #OffSeq #WordPress #Vulnerability #CVE2025
-
🔎 CVE-2025-11544 (CRITICAL, CVSS 9.5): Sharp Display Solutions projectors let attackers upload unauthorized firmware—remote, no auth needed. All models vulnerable. Urgently segment, restrict, and monitor! https://radar.offseq.com/threat/cve-2025-11544-cwe-912-hidden-functionality-in-sha-156315c0 #OffSeq #CVE2025 #infosec #embeddedsecurity
-
🔎 CVE-2025-11544 (CRITICAL, CVSS 9.5): Sharp Display Solutions projectors let attackers upload unauthorized firmware—remote, no auth needed. All models vulnerable. Urgently segment, restrict, and monitor! https://radar.offseq.com/threat/cve-2025-11544-cwe-912-hidden-functionality-in-sha-156315c0 #OffSeq #CVE2025 #infosec #embeddedsecurity
-
🔎 CVE-2025-11544 (CRITICAL, CVSS 9.5): Sharp Display Solutions projectors let attackers upload unauthorized firmware—remote, no auth needed. All models vulnerable. Urgently segment, restrict, and monitor! https://radar.offseq.com/threat/cve-2025-11544-cwe-912-hidden-functionality-in-sha-156315c0 #OffSeq #CVE2025 #infosec #embeddedsecurity
-
🔎 CVE-2025-11544 (CRITICAL, CVSS 9.5): Sharp Display Solutions projectors let attackers upload unauthorized firmware—remote, no auth needed. All models vulnerable. Urgently segment, restrict, and monitor! https://radar.offseq.com/threat/cve-2025-11544-cwe-912-hidden-functionality-in-sha-156315c0 #OffSeq #CVE2025 #infosec #embeddedsecurity
-
🔴 CVE-2025-11545: CRITICAL vuln in all Sharp projectors—embedded HTTP server leaks sensitive info, enables unauth’d remote actions. Network access only! Segment, restrict HTTP, monitor for abuse. Patch ASAP when available. https://radar.offseq.com/threat/cve-2025-11545-cwe-497-exposure-of-sensitive-syste-092c5862 #OffSeq #CVE2025 #IoTSecurity
-
🔴 CVE-2025-11545: CRITICAL vuln in all Sharp projectors—embedded HTTP server leaks sensitive info, enables unauth’d remote actions. Network access only! Segment, restrict HTTP, monitor for abuse. Patch ASAP when available. https://radar.offseq.com/threat/cve-2025-11545-cwe-497-exposure-of-sensitive-syste-092c5862 #OffSeq #CVE2025 #IoTSecurity
-
🔴 CVE-2025-11545: CRITICAL vuln in all Sharp projectors—embedded HTTP server leaks sensitive info, enables unauth’d remote actions. Network access only! Segment, restrict HTTP, monitor for abuse. Patch ASAP when available. https://radar.offseq.com/threat/cve-2025-11545-cwe-497-exposure-of-sensitive-syste-092c5862 #OffSeq #CVE2025 #IoTSecurity
-
🔴 CVE-2025-11545: CRITICAL vuln in all Sharp projectors—embedded HTTP server leaks sensitive info, enables unauth’d remote actions. Network access only! Segment, restrict HTTP, monitor for abuse. Patch ASAP when available. https://radar.offseq.com/threat/cve-2025-11545-cwe-497-exposure-of-sensitive-syste-092c5862 #OffSeq #CVE2025 #IoTSecurity
-
🚨 CVE-2025-15016: CRITICAL flaw in Ragic Enterprise Cloud Database. Hard-coded crypto key enables remote, unauthenticated access as any user. Audit & restrict access urgently. No patch yet—mitigate now! https://radar.offseq.com/threat/cve-2025-15016-cwe-321-use-of-hard-coded-cryptogra-828a99de #OffSeq #CloudSecurity #Vulnerability #CVE2025
-
🚨 CVE-2025-15016: CRITICAL flaw in Ragic Enterprise Cloud Database. Hard-coded crypto key enables remote, unauthenticated access as any user. Audit & restrict access urgently. No patch yet—mitigate now! https://radar.offseq.com/threat/cve-2025-15016-cwe-321-use-of-hard-coded-cryptogra-828a99de #OffSeq #CloudSecurity #Vulnerability #CVE2025
-
🚨 CVE-2025-15016: CRITICAL flaw in Ragic Enterprise Cloud Database. Hard-coded crypto key enables remote, unauthenticated access as any user. Audit & restrict access urgently. No patch yet—mitigate now! https://radar.offseq.com/threat/cve-2025-15016-cwe-321-use-of-hard-coded-cryptogra-828a99de #OffSeq #CloudSecurity #Vulnerability #CVE2025
-
🚨 CVE-2025-15016: CRITICAL flaw in Ragic Enterprise Cloud Database. Hard-coded crypto key enables remote, unauthenticated access as any user. Audit & restrict access urgently. No patch yet—mitigate now! https://radar.offseq.com/threat/cve-2025-15016-cwe-321-use-of-hard-coded-cryptogra-828a99de #OffSeq #CloudSecurity #Vulnerability #CVE2025
-
🎯 Threat Intelligence
===================Executive summary: The ProjectDiscovery year-in-review highlights a small set of high-impact vulnerabilities that drove exploitation behaviour across 2025. Public disclosure, rapid PoCs, and immediate scanning activity shrank the window between advisories and operational exploitation for issues offering unauthenticated access, reliable RCE, or broad reach.
Technical details:
• CVE-2025-55182 — React Server Components deserialization flaw (branded React2Shell). The bug enabled unauthenticated remote code execution at framework level, increasing the number of viable targets across internal, staging, and production applications.
• CVE-2025-31324 — SAP NetWeaver Visual Composer Metadata Uploader lacked authentication, allowing direct upload of JSP web shells and immediate code execution in affected deployments.
• Additional notable mentions in the report include CVE-2025-0108 (PAN-OS authentication bypass), CVE-2025-20188 (Cisco IOS XE hardcoded JWT), and CVE-2025-32433 (Erlang/OTP SSH RCE).Analysis:
• Attackers prioritized practicality over novelty: unauthenticated flaws and RCE at scale provided predictable, high-value access paths (e.g., SAP systems leading to enterprise-wide impact).
• Framework-level flaws (React2Shell) blurred the boundary between application internals and external attack surface, making many otherwise non-exposed apps exploitable.
• Exploitation progressed through observable phases: perimeter device compromise, runtime/software exposure, ubiquity as multiplier, and finally developer/update infrastructure targeting.Detection:
• Community detection work and exposure scanning (including public Nuclei templates) were primary signals cited for tracking exploitation. Example template reference: Nuclei template: CVE-2025-55182.
• Observable indicators included rapid, high-volume scanning for framework-specific endpoints and attempts to upload/execute web shell artifacts against upload endpoints.Mitigation and defender takeaways (reported):
• The year demonstrated narrowing disclosure-to-exploit windows and emphasized treating widely deployed frameworks as part of the external attack surface.
• Incident response priorities shifted toward faster detection of scanning/exploitation activity and inventorying framework exposure across environments.References:
• ProjectDiscovery: Year in Review: The Vulnerabilities That Defined 2025 • CVE-2025-55182, CVE-2025-31324, CVE-2025-0108, CVE-2025-20188, CVE-2025-32433🔹 React2Shell #CVE2025 #SAPNetWeaver #Nuclei #ThreatIntel
🔗 Source: https://projectdiscovery.io/blog/year-in-review-the-vulnerabilities-that-defined-2025
-
🎯 Threat Intelligence
===================Executive summary: The ProjectDiscovery year-in-review highlights a small set of high-impact vulnerabilities that drove exploitation behaviour across 2025. Public disclosure, rapid PoCs, and immediate scanning activity shrank the window between advisories and operational exploitation for issues offering unauthenticated access, reliable RCE, or broad reach.
Technical details:
• CVE-2025-55182 — React Server Components deserialization flaw (branded React2Shell). The bug enabled unauthenticated remote code execution at framework level, increasing the number of viable targets across internal, staging, and production applications.
• CVE-2025-31324 — SAP NetWeaver Visual Composer Metadata Uploader lacked authentication, allowing direct upload of JSP web shells and immediate code execution in affected deployments.
• Additional notable mentions in the report include CVE-2025-0108 (PAN-OS authentication bypass), CVE-2025-20188 (Cisco IOS XE hardcoded JWT), and CVE-2025-32433 (Erlang/OTP SSH RCE).Analysis:
• Attackers prioritized practicality over novelty: unauthenticated flaws and RCE at scale provided predictable, high-value access paths (e.g., SAP systems leading to enterprise-wide impact).
• Framework-level flaws (React2Shell) blurred the boundary between application internals and external attack surface, making many otherwise non-exposed apps exploitable.
• Exploitation progressed through observable phases: perimeter device compromise, runtime/software exposure, ubiquity as multiplier, and finally developer/update infrastructure targeting.Detection:
• Community detection work and exposure scanning (including public Nuclei templates) were primary signals cited for tracking exploitation. Example template reference: Nuclei template: CVE-2025-55182.
• Observable indicators included rapid, high-volume scanning for framework-specific endpoints and attempts to upload/execute web shell artifacts against upload endpoints.Mitigation and defender takeaways (reported):
• The year demonstrated narrowing disclosure-to-exploit windows and emphasized treating widely deployed frameworks as part of the external attack surface.
• Incident response priorities shifted toward faster detection of scanning/exploitation activity and inventorying framework exposure across environments.References:
• ProjectDiscovery: Year in Review: The Vulnerabilities That Defined 2025 • CVE-2025-55182, CVE-2025-31324, CVE-2025-0108, CVE-2025-20188, CVE-2025-32433🔹 React2Shell #CVE2025 #SAPNetWeaver #Nuclei #ThreatIntel
🔗 Source: https://projectdiscovery.io/blog/year-in-review-the-vulnerabilities-that-defined-2025
-
🚨 CVE-2025-68398: CRITICAL vuln in Weblate (<5.15.1). Privileged users can overwrite Git configs, risking full system compromise. Patch to 5.15.1+ & audit Git settings now! https://radar.offseq.com/threat/cve-2025-68398-cwe-20-improper-input-validation-in-186802ce #OffSeq #Weblate #Infosec #CVE2025
-
🚨 CVE-2025-68398: CRITICAL vuln in Weblate (<5.15.1). Privileged users can overwrite Git configs, risking full system compromise. Patch to 5.15.1+ & audit Git settings now! https://radar.offseq.com/threat/cve-2025-68398-cwe-20-improper-input-validation-in-186802ce #OffSeq #Weblate #Infosec #CVE2025
-
🚨 CVE-2025-68398: CRITICAL vuln in Weblate (<5.15.1). Privileged users can overwrite Git configs, risking full system compromise. Patch to 5.15.1+ & audit Git settings now! https://radar.offseq.com/threat/cve-2025-68398-cwe-20-improper-input-validation-in-186802ce #OffSeq #Weblate #Infosec #CVE2025
-
🚨 CVE-2025-68398: CRITICAL vuln in Weblate (<5.15.1). Privileged users can overwrite Git configs, risking full system compromise. Patch to 5.15.1+ & audit Git settings now! https://radar.offseq.com/threat/cve-2025-68398-cwe-20-improper-input-validation-in-186802ce #OffSeq #Weblate #Infosec #CVE2025
-
🚨 CVE-2025-68398: CRITICAL vuln in Weblate (<5.15.1). Privileged users can overwrite Git configs, risking full system compromise. Patch to 5.15.1+ & audit Git settings now! https://radar.offseq.com/threat/cve-2025-68398-cwe-20-improper-input-validation-in-186802ce #OffSeq #Weblate #Infosec #CVE2025
-
⚠️ CRITICAL: CVE-2025-47372 impacts Qualcomm Snapdragon (many models). Classic buffer overflow via oversized ELF files causes memory corruption—no auth required. Security teams: review exposure & monitor for updates. https://radar.offseq.com/threat/cve-2025-47372-cwe-120-buffer-copy-without-checkin-1257e58a #OffSeq #Vulnerability #Snapdragon #CVE2025
-
⚠️ CRITICAL: CVE-2025-47372 impacts Qualcomm Snapdragon (many models). Classic buffer overflow via oversized ELF files causes memory corruption—no auth required. Security teams: review exposure & monitor for updates. https://radar.offseq.com/threat/cve-2025-47372-cwe-120-buffer-copy-without-checkin-1257e58a #OffSeq #Vulnerability #Snapdragon #CVE2025
-
⚠️ CRITICAL: CVE-2025-47372 impacts Qualcomm Snapdragon (many models). Classic buffer overflow via oversized ELF files causes memory corruption—no auth required. Security teams: review exposure & monitor for updates. https://radar.offseq.com/threat/cve-2025-47372-cwe-120-buffer-copy-without-checkin-1257e58a #OffSeq #Vulnerability #Snapdragon #CVE2025
-
⚠️ CRITICAL: CVE-2025-47372 impacts Qualcomm Snapdragon (many models). Classic buffer overflow via oversized ELF files causes memory corruption—no auth required. Security teams: review exposure & monitor for updates. https://radar.offseq.com/threat/cve-2025-47372-cwe-120-buffer-copy-without-checkin-1257e58a #OffSeq #Vulnerability #Snapdragon #CVE2025
-
⚠️ HIGH severity: CVE-2025-11924 impacts Ninja Forms (WordPress), letting unauthenticated attackers access form data via REST API. Patch 3.13.1 is ineffective. Restrict API, audit tokens, and monitor logs. More info: https://radar.offseq.com/threat/cve-2025-11924-cwe-639-authorization-bypass-throug-69810fa6 #OffSeq #WordPress #CVE2025 #Security
-
⚠️ HIGH severity: CVE-2025-11924 impacts Ninja Forms (WordPress), letting unauthenticated attackers access form data via REST API. Patch 3.13.1 is ineffective. Restrict API, audit tokens, and monitor logs. More info: https://radar.offseq.com/threat/cve-2025-11924-cwe-639-authorization-bypass-throug-69810fa6 #OffSeq #WordPress #CVE2025 #Security
-
⚠️ HIGH severity: CVE-2025-11924 impacts Ninja Forms (WordPress), letting unauthenticated attackers access form data via REST API. Patch 3.13.1 is ineffective. Restrict API, audit tokens, and monitor logs. More info: https://radar.offseq.com/threat/cve-2025-11924-cwe-639-authorization-bypass-throug-69810fa6 #OffSeq #WordPress #CVE2025 #Security
-
⚠️ HIGH severity: CVE-2025-11924 impacts Ninja Forms (WordPress), letting unauthenticated attackers access form data via REST API. Patch 3.13.1 is ineffective. Restrict API, audit tokens, and monitor logs. More info: https://radar.offseq.com/threat/cve-2025-11924-cwe-639-authorization-bypass-throug-69810fa6 #OffSeq #WordPress #CVE2025 #Security
-
🚨 CRITICAL: CVE-2025-13955 in EZCast Pro II v1.17478.146 — Predictable default Wi-Fi password lets attackers nearby calculate access credentials. Review your AP configs & restrict access. More info: https://radar.offseq.com/threat/cve-2025-13955-cwe-330-use-of-insufficiently-rando-ef4a57fd #OffSeq #CVE2025 #IoTSecurity #Infosec
-
🚨 CRITICAL: CVE-2025-13955 in EZCast Pro II v1.17478.146 — Predictable default Wi-Fi password lets attackers nearby calculate access credentials. Review your AP configs & restrict access. More info: https://radar.offseq.com/threat/cve-2025-13955-cwe-330-use-of-insufficiently-rando-ef4a57fd #OffSeq #CVE2025 #IoTSecurity #Infosec
-
🚨 CRITICAL: CVE-2025-13955 in EZCast Pro II v1.17478.146 — Predictable default Wi-Fi password lets attackers nearby calculate access credentials. Review your AP configs & restrict access. More info: https://radar.offseq.com/threat/cve-2025-13955-cwe-330-use-of-insufficiently-rando-ef4a57fd #OffSeq #CVE2025 #IoTSecurity #Infosec
-
🚨 CRITICAL: CVE-2025-13955 in EZCast Pro II v1.17478.146 — Predictable default Wi-Fi password lets attackers nearby calculate access credentials. Review your AP configs & restrict access. More info: https://radar.offseq.com/threat/cve-2025-13955-cwe-330-use-of-insufficiently-rando-ef4a57fd #OffSeq #CVE2025 #IoTSecurity #Infosec
-
Cal.com has patched a critical authentication bypass (CVE-2025-66489) that allowed attackers to submit any non-empty TOTP field and skip password checks. Versions ≤5.9.7 were impacted.
Update to 5.9.8 to ensure both password and TOTP verification are enforced.
How should MFA implementations be validated to prevent logic gaps like this?Share your insights and follow us for more security reporting.
#infosec #appsec #CVE2025 #authentication #MFA #ThreatIntel #SecureCoding #SoftwareSecurity #VulnerabilityManagement #SecurityUpdate
-
Cal.com has patched a critical authentication bypass (CVE-2025-66489) that allowed attackers to submit any non-empty TOTP field and skip password checks. Versions ≤5.9.7 were impacted.
Update to 5.9.8 to ensure both password and TOTP verification are enforced.
How should MFA implementations be validated to prevent logic gaps like this?Share your insights and follow us for more security reporting.
#infosec #appsec #CVE2025 #authentication #MFA #ThreatIntel #SecureCoding #SoftwareSecurity #VulnerabilityManagement #SecurityUpdate
-
Cal.com has patched a critical authentication bypass (CVE-2025-66489) that allowed attackers to submit any non-empty TOTP field and skip password checks. Versions ≤5.9.7 were impacted.
Update to 5.9.8 to ensure both password and TOTP verification are enforced.
How should MFA implementations be validated to prevent logic gaps like this?Share your insights and follow us for more security reporting.
#infosec #appsec #CVE2025 #authentication #MFA #ThreatIntel #SecureCoding #SoftwareSecurity #VulnerabilityManagement #SecurityUpdate
-
Cal.com has patched a critical authentication bypass (CVE-2025-66489) that allowed attackers to submit any non-empty TOTP field and skip password checks. Versions ≤5.9.7 were impacted.
Update to 5.9.8 to ensure both password and TOTP verification are enforced.
How should MFA implementations be validated to prevent logic gaps like this?Share your insights and follow us for more security reporting.
#infosec #appsec #CVE2025 #authentication #MFA #ThreatIntel #SecureCoding #SoftwareSecurity #VulnerabilityManagement #SecurityUpdate