24h | 7d | 30d

Overview

  • n8n-io
  • n8n

04 Feb 2026
Published
05 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
0.03%

KEV

Description

n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. This issue has been patched in versions 1.123.17 and 2.5.2.

Statistics

  • 19 Posts
  • 3 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

⚠️ Critical RCE flaw in n8n (CVE-2026-25049, CVSS 9.4) lets authenticated users execute system commands via crafted workflow expressions.

Public webhooks exposed → remote trigger, credential theft, server takeover.

🔗 Exploit path, affected versions, patch details → thehackernews.com/2026/02/crit

  • 0
  • 1
  • 0
  • 19h ago
Profile picture fallback

Yet another critical vulnerability in n8n - CVE-2026-25049 (CVSS 9.4).

Vulnerability detection script here:
github.com/rxerium/rxerium-tem

Patched versions are 1.123.17 / 2.5.2 as per:
github.com/n8n-io/n8n/security

  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback

n8n : la faille critique CVE-2026-25049 réactive une précédente vulnérabilité it-connect.fr/n8n-cve-2026-250 #ActuCybersécurité #Cybersécurité #Vulnérabilité

  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback

It seems that the recent #n8n CVE-2026-25049 is (EDIT: or was? My e-mail got answered with a generic response by an AI assistant) not only exploitable on self-hosted instances, but also in the n8n cloud. At least this is what the URL briefly visible in this video indicates. youtube.com/watch?v=QLrm7jx8kew (skip to 0:15 for a clear shot).

  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback

En las últimas 24 horas, ataques críticos apuntan a VMware ESXi y servidores NGINX, mientras herramientas avanzadas evaden soluciones EDR y métodos sofisticados reducen la seguridad MFA incluso con FIDO2; además, se detecta vulnerabilidad remota en n8n y se revelan ciberoperaciones estadounidenses contra Irán, resaltando crecientes riesgos globales. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 05/02/26 📆 |====

🚨 VULNERABILIDAD CRÍTICA EN VMWARE ESXI EXPLOTADA POR RANSOMWARE

La Agencia de Seguridad Cibernética y de Infraestructura (CISA) ha confirmado que grupos de ransomware están aprovechando una vulnerabilidad en VMware ESXi que permite a los atacantes escapar del entorno de sandbox y ejecutar código malicioso. Esta falla, previamente identificada en ataques de día cero, representa un riesgo severo para infraestructuras virtualizadas, comprometiendo la seguridad y continuidad de sistemas empresariales críticos. Mantén tu entorno actualizado y monitorea posibles indicadores de compromiso para evitar ser víctima. Descubre cómo protegerte frente a esta amenaza aquí 👉 t.co/nK1eQQfD5T

🛡️ HERRAMIENTA QUE ELIMINA SOLUCIONES EDR UTILIZA DRIVER FIRMADO LEGÍTIMO

Recientes investigaciones revelan que ciberdelincuentes están utilizando un driver legítimo, aunque revocado, de EnCase en una herramienta avanzada destinada a deshabilitar soluciones de detección y respuesta en endpoints (EDR). Esta técnica detecta hasta 59 herramientas de seguridad diferentes para neutralizarlas, incrementando la efectividad de los ataques al evadir defensas automatizadas. Es crucial verificar la integridad de los controladores en tus sistemas y actualizar las políticas de seguridad para mitigar este riesgo. Aprende más sobre esta amenaza sofisticada y cómo defenderte 👉 djar.co/yEywQ

🔐 ATAQUES DE REDUCCIÓN DE NIVEL DE AUTENTICACIÓN: EVADIENDO MFA AVANZADO

Un análisis profundo expone métodos utilizados por atacantes para forzar a las víctimas a emplear métodos de autenticación vulnerables al phishing, incluso cuando se usan claves hardware FIDO2. Estos ataques de reducción de nivel de autenticación representan una amenaza grave para la seguridad multi-factor (MFA), al crear vectores de entrada alternativos fácilmente explotables. Es vital comprender estas técnicas para fortalecer las defensas y educar a los usuarios sobre prácticas seguras en la gestión de autenticaciones. Infórmate sobre las tácticas y cómo proteger tu identidad digital 👉 djar.co/8g6feU

🌐 SERVIDORES NGINX COMPROMETIDOS PARA SECUESTRAR TRÁFICO DE USUARIOS

Se ha detectado un actor malicioso que compromete servidores NGINX con el objetivo de redirigir el tráfico legítimo de usuarios hacia su infraestructura controlada, facilitando técnicas de phishing, malware o robo de datos. Este compromiso afecta la confianza y seguridad de las comunicaciones en línea, especialmente para sitios web que emplean esta popular plataforma. Es fundamental revisar las configuraciones y parches de seguridad en servidores NGINX para evitar ser parte de esta cadena de ataque. Conoce las señales de compromiso y cómo reforzar tu servidor 👉 djar.co/RJrd

💥 VULNERABILIDAD DE EJECUCIÓN REMOTA DE CÓDIGO EN N8N (CVE-2026-25049)

Se ha identificado una grave vulnerabilidad en n8n, una herramienta de automatización de flujos de trabajo, que permite la ejecución remota de código. Esta falla puede ser explotada para controlar sistemas afectados y realizar acciones maliciosas sin autorización, poniendo en riesgo la integridad y confidencialidad de datos. Mantener actualizado n8n con los últimos parches es indispensable para evitar esta amenaza. Consulta el análisis completo y las recomendaciones para protegerte 👉 djar.co/kQzEg

⚔️ USO DE CIBERARMAS POR EE. UU. PARA INTERRUPCIÓN DE DEFENSAS AÉREAS IRANÍES EN 2025

Recientes revelaciones indican que el Ejército de Estados Unidos empleó armas cibernéticas para atacar sistemas de defensa aérea iraníes durante 2025, marcando una de las operaciones más sofisticadas y estratégicas en el ámbito de la guerra cibernética contra Irán. Este episodio subraya la creciente importancia de la ciberdefensa en conflictos geopolíticos y la necesidad de fortalecer las infraestructuras críticas contra amenazas estatales avanzadas. Profundiza en los detalles de esta operación y sus implicaciones globales 👉 djar.co/JlWAJ

  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback

CVE-2026-25049 highlights weaknesses in sandboxing user-defined JavaScript expressions within n8n workflows.

Multiple research teams demonstrated authenticated sandbox escape leading to unrestricted RCE, credential exposure, filesystem access, cloud pivoting, and AI workflow manipulation. The issue stems from incomplete AST-based sandboxing and runtime enforcement gaps.

Fixes have been released, and mitigation guidance includes updating, rotating secrets, and restricting workflow permissions.

Source: bleepingcomputer.com/news/secu

💬 What lessons does this case offer for securing automation platforms?

➕ Follow TechNadu for accurate, vendor-neutral infosec reporting.

  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback

Collectively tracked as CVE-2026-25049, the issues can be exploited by any authenticated user who can create or edit workflows on the platform to perform unrestricted remote code execution on the n8n server. bleepingcomputer.com/news/secu

  • 0
  • 0
  • 1
  • 15h ago
Profile picture fallback

🚨 THE NI8MARE IS REAL. 🚨

Survived a critical RCE breach attempt (CVE-2026-25049) on my n8n setup. I didn’t just patch; I surgically hardened to v2.7.1.

🛑 No "latest" tags. 🛑 No ghost credentials. 🛠️ Sequential pinning only.

Get the forensic playbook FIX IT: thecybermind.co/n8n-update

thecybermind.co/2026/02/05/cve

  • 0
  • 0
  • 0
  • 11h ago

Bluesky

Profile picture fallback
Vulnérabilité critique n8n CVE-2026-25049 permet l’exécution de commandes système via des workflows malveillants. Une faille grave liée à une mauvaise sanitization, malgré un correctif précédent. #Automatisation #CyberSecurity ⚠️
  • 0
  • 1
  • 0
  • 18h ago
Profile picture fallback
Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 1
  • 0
  • 17h ago
Profile picture fallback
Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows https://thehackernews.com/2026/02/critical-n8n-flaw-cve-2026-25049.html
  • 0
  • 0
  • 1
  • 23h ago
Profile picture fallback
A critical n8n vulnerability (CVE-2026-25049) allows authenticated workflow creators to execute arbitrary system commands, risking full server compromise.
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
A critical flaw (CVE-2026-25049) in the automation platform n8n enables authenticated users to execute system commands, representing a bypass for […]
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
⚠️ 𝗡𝗼𝘂𝘃𝗲𝗮𝘂 𝗽𝗮𝘁𝗰𝗵 𝗻𝟴𝗻 La faille critique CVE-2026-25049 réactive une précédente vulnérabilité Retrouvez mon article à ce sujet 👇 - www.it-connect.fr/n8n-cve-2026... #n8n #infosec #nocode #cybersecurite
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
Researchers disclosed critical n8n vulnerabilities (CVE-2026-25049) enabling sandbox escape and server-level control by authenticated users. Patches are available, and no confirmed exploitation has been reported. #CyberSecurity #n8n #CVE #OpenSourceSecurity #TechNadu
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows reconbee.com/critical-n8n... #n8n #malicious #workflow #cybersecurity #cyberattack
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
n8nで複数の重大な脆弱性、大規模スキャンも観測(CVE-2026-25049,CVE-2026-21858) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Arista Networks
  • Arista Edge Threat Management - Arista Next Generation Firewall

23 Oct 2025
Published
23 Oct 2025
Updated

CVSS v3.1
HIGH (7.2)
EPSS
0.24%

KEV

Description

Diagnostics command injection vulnerability

Statistics

  • 4 Posts
  • 5 Interactions

Last activity: 11 hours ago

Fediverse

Profile picture fallback
[RSS] CVE-2025-6978: Arbitrary Code Execution in the Arista NG Firewall

https://www.thezdi.com/blog/2026/2/4/cve-2025-6978-arbitrary-code-execution-in-the-arista-ng-firewall
  • 0
  • 0
  • 0
  • 11h ago

Bluesky

Profile picture fallback
CVE-2025-6978: Arbitrary Code Execution in the #Arista NG Firewall - our researchers took a deep dive into this recently patched RCE to provide root cause and detection guidance. Read all the details at www.zerodayinitiative.com/blog/2026/2/...
  • 2
  • 3
  • 1
  • 12h ago
Profile picture fallback
[RSS] CVE-2025-6978: Arbitrary Code Execution in the Arista NG Firewall www.thezdi.com -> Original->
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • SolarWinds
  • Web Help Desk

28 Jan 2026
Published
04 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
22.94%

Description

SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.

Statistics

  • 4 Posts
  • 3 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

Here's a summary of the latest important global, technology, and cybersecurity news from the last 24 hours:

**Global:** The US and Russia's New START treaty expired February 5, raising nuclear stability concerns. Israeli airstrikes killed at least 21 Palestinians in Gaza on February 4.

**Technology:** Intel launched new AI chips to challenge Nvidia, and Microsoft/Apple expanded AI tools. SpaceX acquired xAI to advance orbital data centers on February 5. AI is now central to business, drawing half of global startup funding.

**Cybersecurity:** A ransomware group allegedly hit a US airport on February 4. CISA added an actively exploited SolarWinds RCE vulnerability (CVE-2025-40551) to its KEV catalog. Gartner outlined top 2026 cyber trends, including Agentic AI oversight and post-quantum computing.

#News #Anonymous #AnonNews_irc

  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback

The vulnerability under attack, CVE-2025-40551, is an untrusted deserialization flaw that can lead to remote code execution, allowing a remote, unauthenticated attacker to execute OS commands on the affected system. theregister.com/2026/02/04/cri

  • 0
  • 0
  • 1
  • 15h ago

Bluesky

Profile picture fallback
For the last few days, we have been sharing SolarWinds Help Desk CVE-2025-40551 RCE vulnerable IPs (version check based) - ~ 170 seen. This vuln is now on CISAKEV. Data in Vulnerable HTTP reports: www.shadowserver.org/what-we-do/n... Dashboard Tree Map: dashboard.shadowserver.org/statistics/c...
  • 0
  • 3
  • 0
  • 18h ago

Overview

  • djangoproject
  • Django
  • django

03 Feb 2026
Published
03 Feb 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. Raster lookups on ``RasterField`` (only implemented on PostGIS) allows remote attackers to inject SQL via the band index parameter. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Tarek Nakkouch for reporting this issue.

Statistics

  • 4 Posts

Last activity: 8 hours ago

Fediverse

Profile picture fallback
[RSS] Django SQL Injection in RasterField lookup (CVE-2026-1207)

https://vulnerabletarget.com/VT-2026-1207
  • 0
  • 0
  • 0
  • 8h ago

Bluesky

Profile picture fallback
Django SQL Injection in RasterField lookup (CVE-2026-1207)
  • 0
  • 0
  • 1
  • 10h ago
Profile picture fallback
[RSS] Django SQL Injection in RasterField lookup (CVE-2026-1207) vulnerabletarget.com -> Original->
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • @react-native-community/cli-server-api

03 Nov 2025
Published
06 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.40%

Description

The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server and run arbitrary executables. On Windows, the attackers can also execute arbitrary shell commands with fully controlled arguments.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture fallback

‼️ CISA has added two vulnerabilities to the KEV Catalog

darkwebinformer.com/cisa-kev-c

CVE-2026-24423: SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability:

SmarterTools SmarterMail contains a missing authentication for critical function vulnerability in the ConnectToHub API method. This could allow the attacker to point the SmarterMail instance to a malicious HTTP server which serves the malicious OS command and could lead to command execution.

CVE-2025-11953: React Native Community CLI OS Command Injection Vulnerability:

React Native Community CLI contains an OS command injection vulnerability which could allow unauthenticated network attackers to send POST requests to the Metro Development Server and run arbitrary executables via a vulnerable endpoint exposed by the server. On Windows, attackers can also execute arbitrary shell commands with fully controlled arguments.

  • 0
  • 1
  • 0
  • 9h ago

Bluesky

Profile picture fallback
Metro4Shell: la vulnerabilità critica che colpisce React Native 📌 Link all'articolo : www.redhotcyber.com/post/met... #redhotcyber #news #vulnerabilita #meteo4shell #reactnative #sicurezzainformatica #cve202511953 #endpointhttp
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
~Cisa~ CISA added two actively exploited vulnerabilities, CVE-2025-11953 (React Native) and CVE-2026-24423 (SmarterMail), to its KEV catalog. - IOCs: CVE-2025-11953, CVE-2026-24423 - #CISA #KEV #ThreatIntel
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • win.rar GmbH
  • WinRAR

08 Aug 2025
Published
21 Oct 2025
Updated

CVSS v4.0
HIGH (8.4)
EPSS
3.90%

Description

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

Statistics

  • 2 Posts

Last activity: 6 hours ago

Fediverse

Profile picture fallback

📰 Chinese APT 'Amaranth-Dragon' Hits Southeast Asian Governments with WinRAR Exploit

🇨🇳 New Chinese APT 'Amaranth-Dragon' targets Southeast Asian governments. Exploits WinRAR flaw CVE-2025-8088 for initial access. Uses custom 'TGAmaranth RAT' with Telegram for stealthy C2. 🐉 #APT #CyberEspionage #AmaranthDragon

🔗 cyber.netsecops.io/articles/ch

  • 0
  • 0
  • 0
  • 12h ago

Bluesky

Profile picture fallback
圧縮・解凍ソフトのWinRARの脆弱性を中国系ハッキング グループがサイバー攻撃へ悪用(CVE-2025-8088) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • OpenSSL
  • OpenSSL

27 Jan 2026
Published
29 Jan 2026
Updated

CVSS
Pending
EPSS
0.00%

KEV

Description

Issue summary: The 'openssl dgst' command-line tool silently truncates input data to 16MB when using one-shot signing algorithms and reports success instead of an error. Impact summary: A user signing or verifying files larger than 16MB with one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire file is authenticated while trailing data beyond 16MB remains unauthenticated. When the 'openssl dgst' command is used with algorithms that only support one-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input is buffered with a 16MB limit. If the input exceeds this limit, the tool silently truncates to the first 16MB and continues without signaling an error, contrary to what the documentation states. This creates an integrity gap where trailing bytes can be modified without detection if both signing and verification are performed using the same affected codepath. The issue affects only the command-line tool behavior. Verifiers that process the full message using library APIs will reject the signature, so the risk primarily affects workflows that both sign and verify with the affected 'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and library users are unaffected. The FIPS modules in 3.5 and 3.6 are not affected by this issue, as the command-line tools are outside the OpenSSL FIPS module boundary. OpenSSL 3.5 and 3.6 are vulnerable to this issue. OpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.

Statistics

  • 1 Post
  • 18 Interactions

Last activity: 21 hours ago

Fediverse

Profile picture fallback

One of the OpenSSL disasters announced last week (CVE-2025-15469) is really the fault of OpenSSL's detached-signature interface. With a signed-message/message-recovery interface, the bug would have had no effect on security, and would have been easier to catch. Interfaces matter.

  • 7
  • 11
  • 0
  • 21h ago

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
16.41%

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 14 hours ago

Fediverse

Profile picture fallback

This Ivanti Endpoint Manager Mobile (IPMM) security advisory seems to fit the timeline of the incident: forums.ivanti.com/s/article/Se

  • 1
  • 0
  • 0
  • 14h ago

Bluesky

Profile picture fallback
📢 Ivanti EPMM : deux RCE pré-auth (CVE-2026-1281/1340) activement exploitées — analyse watchTowr 📝 Source: watchTowr Labs publie une anal… https://cyberveille.ch/posts/2026-02-05-ivanti-epmm-deux-rce-pre-auth-cve-2026-1281-1340-activement-exploitees-analyse-watchtowr/ #Apache_RewriteMap #Cyberveille
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
📢 NCSC NL alerte: exploitation active de la zero‑day Ivanti EPMM (CVE‑2026‑1281), assume‑breach requis 📝 Selon le NCSC (Pays-Bas), un… https://cyberveille.ch/posts/2026-02-05-ncsc-nl-alerte-exploitation-active-de-la-zero-day-ivanti-epmm-cve-2026-1281-assume-breach-requis/ #CVE_2026_1281 #Cyberveille
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • VMware ESXi

04 Mar 2025
Published
21 Oct 2025
Updated

CVSS v3.1
HIGH (8.2)
EPSS
6.15%

Description

VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.

Statistics

  • 4 Posts

Last activity: 15 hours ago

Bluesky

Profile picture fallback
CVE-2025-22225 in VMware ESXi now used in active ransomware attacks https://securityaffairs.com/187637/security/cve-2025-22225-in-vmware-esxi-now-used-in-active-ransomware-attacks.html
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
米CISA、VMware ESXiの脆弱性がランサムウェア攻撃に悪用されていると警告(CVE-2025-22225) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/43780/
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
Broadcom patched this ESXi arbitrary-write vulnerability (tracked as CVE-2025-22225) almost one year ago, in March 2025, alongside a memory leak (CVE-2025-22226) and a TOCTOU flaw (CVE-2025-22224), and tagged them all as actively exploited zero-days. www.bleepingcomputer.com/news/securit...
  • 0
  • 0
  • 1
  • 15h ago

Overview

  • Fortinet
  • FortiOS

05 Feb 2026
Published
06 Feb 2026
Updated

CVSS v3.1
LOW (3.2)
EPSS
Pending

KEV

Description

Fortinet FortiOS through 7.6.6 allows attackers to decrypt LDAP credentials stored in device configuration files, as exploited in the wild from 2025-12-16 through 2026 (by default, the encryption key is the same across all customers' installations). NOTE: the Supplier's position is that the instance of CWE-1394 is not a vulnerability because customers "are supposed to enable" a non-default option that eliminates the weakness. However, that non-default option can disrupt functionality as shown in the "Managing FortiGates with private data encryption" document, and is therefore intentionally not a default option.

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

Fortinet FortiOS through 7.6.6 allows attackers to decrypt LDAP credentials stored in device configuration files, as exploited in the wild from 2025-12-16 through 2026.

CVE-2026-25815

"customers "are supposed to enable" a non-default option that eliminates the weakness. " -> disputed

#fortinet #cybersecurity #vulnerabilitymanagement

🔗 vulnerability.circl.lu/vuln/CV

  • 3
  • 2
  • 0
  • 7h ago
Showing 1 to 10 of 42 CVEs