24h | 7d | 30d

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
06 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
77.80%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 37 Posts
  • 63 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture

CVE-2025-55182 (Next.js)を悪用した攻撃はついに拡張機能による自動的な攻撃ができるレベルに。

Exec じゃあないんですよ

  • 3
  • 0
  • 0
  • 22h ago
Profile picture

React2Shell blog update 🚨 compromised Next.js nodes are rapidly being enlisted into botnets; threat actor activity reaches ~80 source countries; and more. greynoise.io/blog/cve-2025-551

  • 2
  • 7
  • 0
  • 7h ago
Profile picture

En las últimas 24 horas se han detectado vulnerabilidades graves en dispositivos KVM chinos, explotación de 13 años en QEMU y fallos que permiten desactivar BitLocker en Windows, además de un análisis profundo de React2Shell y una alerta del FBI sobre secuestros virtuales por manipulación fotográfica, mientras un banco de Chipre fortalece su defensa ante ciberataques con Cloudflare. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 09/12/25 📆 |====

🔓 VULNERABILIDADES GRAVES EN SWITCH KVM CHINO

Un dispositivo de gestión remota de bajo costo fabricado por Sipeed presenta una grave vulnerabilidad que permite la grabación no autorizada de audio y otros fallos de seguridad críticos. Esta brecha pone en riesgo la confidencialidad y la integridad de la información gestionada a través del switch. Recomendamos evaluar el uso de estos dispositivos y aplicar parches o mitigaciones específicas. Conoce más detalles sobre estas fallas y cómo proteger tus sistemas 👉 djar.co/vddme

🛡️ POSESIÓN DE OBJETOS COM PARA DESACTIVAR BITLOCKER

Investigadores han descubierto que múltiples interfaces COM poco documentadas en Windows pueden ser explotadas para desactivar el cifrado Bitlocker sin autorización. Esta técnica podría permitir a atacantes evitar las protecciones de cifrado y acceder a datos sensibles almacenados en discos duros. Es vital reforzar las políticas de seguridad y controlar estrictamente los accesos a estas interfaces internas. Explora el método y recomendaciones para blindar Bitlocker aquí 👉 djar.co/gmEf

🐚 ANÁLISIS PROFUNDO DE LA VULNERABILIDAD REACT2SHELL CVE-2025-55182

Se presenta un estudio técnico detallado sobre la vulnerabilidad React2Shell, que aprovecha errores de deserialización para ejecutar código malicioso en frameworks afectados. El análisis incluye la identificación de cadenas de gadgets, escenarios de explotación, y su impacto en aplicaciones web modernas. Entender esta amenaza es esencial para desarrolladores y equipos de seguridad que buscan proteger sus entornos. Descubre el informe completo y cómo mitigar este riesgo 👉 djar.co/ZV3Jr

📸 ALERTA DEL FBI: SECUESTROS VIRTUALES MEDIANTE MANIPULACIÓN DE FOTOS ONLINE

El FBI ha alertado sobre una modalidad de fraude en la que criminales manipulan fotografías compartidas en redes sociales para crear falsas pruebas de vida de supuestas víctimas y exigir rescates por secuestros virtuales. Esta técnica sofisticada pone en evidencia la importancia de una gestión cuidadosa de la información personal en internet y la implementación de medidas de verificación ante solicitudes sospechosas. Infórmate sobre cómo evitar ser víctima de estas estafas 👉 djar.co/yN5Vwg

🏦 CASO DE ÉXITO: BANCO DE CHIPRE Y CLOUDFLARE PARA DEFENDERSE DE CIBERATAQUES

Uno de los bancos más grandes de Chipre ha logrado eliminar retrasos críticos en la respuesta a ciberataques y mantener la disponibilidad continua de sus servicios esenciales mediante soluciones integradas con Cloudflare. Este caso evidencia cómo las alianzas tecnológicas estratégicas y la implementación de protecciones avanzadas permiten fortalecer la resiliencia de infraestructuras financieras ante amenazas persistentes. Descubre los detalles y aprendizajes clave de esta colaboración 👉 djar.co/Bh1sQG

🐛 EXPLOTACIÓN DE UNA VULNERABILIDAD DE 13 AÑOS EN QEMU

Se ha documentado la explotación de un bug en QEMU, el popular emulador y virtualizador de código abierto, que se remonta a más de una década. Este caso resalta la importancia crítica de mantener actualizado el software de virtualización para evitar que vulnerabilidades antiguas sean aprovechadas por atacantes. Mantener los sistemas parches al día es fundamental para proteger entornos virtuales. Conoce más sobre esta vulnerabilidad y mejores prácticas para mitigación 👉 djar.co/8mhb1

  • 1
  • 1
  • 0
  • 13h ago
Profile picture
  • 1
  • 1
  • 0
  • 5h ago
Profile picture

React2Shell Exploitation in the Wild: CVE-2025-55182 Analysis

Within 24 hours of the React Server Components RCE disclosure (CVE-2025-55182, CVSS 10.0), we observed active exploitation campaigns targeting vulnerable Next.JS applications, leading to cryptojacking operations across multiple continents.

Our latest blog post details:

• Real-world incident response from compromised production servers
• Timeline of attack progression from initial recon to persistence
• Multiple threat actor clusters exploiting the same vulnerability
• AI-assisted malware development patterns
• Forensic analysis of deployed cryptominers and backdoors

Key Findings:
- First exploitation attempts detected as early as December 5th, 2025
- Attackers refined their tooling within 18 hours between reinfection attempts
- Targets span US, Europe, and Southeast Asia, including large enterprise environments
- Multiple persistence mechanisms: systemd units, shell injection, custom SSH servers

Full technical analysis on our blog:

tlpblack.net/blog/20251209-the

Hashes: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C2 IP Addresses:
39.97.229[.]220
43.247.134[.]215
45.76.155[.]14
45.157.233[.]80
46.36.37[.]85
47.84.113[.]198
192.9.245[.]121
193.34.213[.]150

Stay safe!

  • 1
  • 0
  • 0
  • 3h ago
Profile picture

New analysis of CVE-2025-55182 probes and payloads hitting our canaries via @albinolobster. Upshot is that attackers don't seem to be doing all they *could* do with this vulnerability yet, have mostly been sticking to familiar patterns for now.

vulncheck.com/blog/react2shell

  • 0
  • 3
  • 0
  • 9h ago
Profile picture

CVE-2025-55182

GG, no re.
And people wonder why we serve only static web pages at work. (it's a lot more effort, but at least nobody is gonna take over the web server itself)

  • 0
  • 3
  • 0
  • 3h ago
Profile picture

🚨 Plugin update: React2ShellPlugin (CVE-2025-55182).

Backdoor detection added - 16k+ Next.js servers detected with in-memory webshells allowing remote code execution.

Results: leakix.net/search?scope=leak&q

  • 0
  • 2
  • 1
  • 10h ago
Profile picture

CVE-2025-55182: real shit
sees myself still using react 18 due to issues: I sleep

#thisshitissoass #security #react

  • 0
  • 0
  • 0
  • 22h ago
Profile picture

We haven't seen a CVSS 10.0 this scary since . 🚨
So we launched the exploit and here is the proof. 👇👇👇

Everyone talks about detecting (CVE-2025-55182). But detection can only take you so far.

To *truly* know if you are exposed to this CVSS 10.0 RCE, you need to validate it.

So we launched the exploit.

We updated our offensive security suite to safely execute the full attack chain against your infrastructure.

Here is how you validate your risk in seconds (see the evidence below 👇):

🚀 Validate directly with Sniper: Auto-Exploiter

Action: Launch Sniper: Auto-Exploiter on the target.

Result: The smoking gun. It executes the payload and confirms RCE.

Proof: As you can see from the report highlights, it achieves code execution as user Next.js and captures full command history.

This isn't a simulation. It's a confirmed RCE path on a Linux target running Next.js.

Why this matters: Standard scanners might flag your safe apps as vulnerable (FPs) or miss modified instances (false negatives). Validation removes the doubt.

Don't guess. Exploit it (safely) before they do.

Run the validation now pentest-tools.com/exploit-help

  • 0
  • 0
  • 0
  • 8h ago
Profile picture

has elaborated on the critical vulnerability, CVE-2025-55182, that affects React 19.x and related server-side frameworks such as Next.js 15.x/16.x. The vulnerability enables unauthenticated remote code execution via malicious HTTP requests targeting the server’s decoding process. Exploitation allows attackers to gain full control over application servers...

blog.checkpoint.com/securing-t

  • 0
  • 0
  • 0
  • 8h ago
Profile picture

🚨 Execute arbitrary code on the server and even compromise the underlying infrastructure. This is what an attacker can do by exploiting CVE-2025-55182.

How can the exploitation of be prevented, detected, and mitigated? 👇🏻

tarlogic.com/blog/cve-2025-551

  • 0
  • 0
  • 0
  • 5h ago
Profile picture

Find out if you are vulnerable to the React2Shell vulnerability, covering both official tracking IDs:

• React Server Component exposure – CVE-2025-55182
• Next.js App Router RCE chain – CVE-2025-66478

#secpoint #secpointpenetrator #nextrce #react2shell #cve #cybersecurity #vulnerabilityscanning #nextjs #react

  • 0
  • 0
  • 0
  • 13h ago

Bluesky

Profile picture
Update on React Server Components CVE-2025-55182: over 165K IPs & 644K domains with vulnerable code found on 2025-12-08 after scan targeting improvements! See: dashboard.shadowserver.org/statistics/c... Check for compromise & patch! Thank you to Validin & LeakIX for the collaboration!
  • 7
  • 12
  • 0
  • 8h ago
Profile picture
👀 React2Shell attacker profiles fresh from GreyNoise telemetry: info.greynoise.io/hubfs/PDFs-S..., don't miss the latest contribution from GreyNoise Labs on React2Shell: www.labs.greynoise.io/grimoire/202... #React2Shell #Nextjs #CVE202555182 #CVE #GreyNoise
  • 5
  • 8
  • 0
  • 5h ago
Profile picture
“CVE-2025-55182 (“React2Shell”) is a critical (CVSS 10.0), unauthenticated remote code execution vulnerability in React Server Components that is under active exploitation.” Brett Leatherman, FBI Assistant Director, Cyber Division: www.linkedin.com/posts/bleath...
  • 1
  • 2
  • 0
  • 10h ago
Profile picture
"EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks" published by Sysdig. #CVE-2025-55182, #EtherRAT, #React2Shell, #DPRK, #CTI https://www.sysdig.com/blog/etherrat-dprk-uses-novel-ethereum-implant-in-react2shell-attacks
  • 1
  • 0
  • 0
  • 10h ago
Profile picture
The Nextjs Nightmare: How a Single Query Parameter Can Give Hackers Root Access Introduction: A critical Server-Side Template Injection (SSTI) vulnerability, tracked as CVE-2025-55182, in Next.js versions 16.0.0 to 16.2.4 allows unauthenticated remote code execution. This flaw transforms a simple…
  • 0
  • 1
  • 0
  • 15h ago
Profile picture
World map of vulnerable IPs: dashboard.shadowserver.org/statistics/c... CVE-2025-55182 tracker: dashboard.shadowserver.org/statistics/c... #CyberCivilDefense
  • 0
  • 1
  • 0
  • 8h ago
Profile picture
“Within 24 hours of CVE-2025-55182 being disclosed .. multiple threat actors linked to China attempting to exploit the bug – .. same time frame that saw the Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) release its own warning.” www.cyberdaily.au/security/129...
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
React2Shell(CVE-2025-55182)とは-React Server Components/Next.jsを直撃する脆弱性 rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #サイバー攻撃
  • 0
  • 0
  • 0
  • 23h ago
Profile picture
The latest update for #Harness includes "DBA vs Developer Dynamics: Bridging the Gap with Database #DevOps" and "Protect Against Critical Unauthenticated RCE in React & Next.js (CVE-2025-55182) with Traceable WAF". #CICD #AI https://opsmtrs.com/4hhDUoO
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
The latest update for #UpGuard includes "Solving Human Risk: Build a Measurable, Security-First Culture" and "Understanding and Mitigating CVE-2025-55182 (React2Shell)". #threatdetection #cybersecurity #datasecurity https://opsmtrs.com/3et5kcy
  • 0
  • 0
  • 0
  • 20h ago
Profile picture
CVE-2025-55182(React2Shell)を巡り、複数の中国系国家支援アクターによる積極的な悪用が進行中です。React Server Componentsの脆弱性を起点とする認証不要型RCEにより、攻撃者はcrafted HTTP requestを介して任意コード実行を行い、バックエンドの完全な制御に至ります。 すでにPoCが公開され、攻撃成功率はほぼ100%。Datadogは80以上の攻撃IPによるスキャンを確認し、Recorded Futureは中国国家系の匿名化ネットワークGobRATの関与を示しました。
  • 0
  • 0
  • 0
  • 18h ago
Profile picture
React2Shell(CVE-2025-55182)による攻撃は、中国政府による攻撃フェーズに入ったと見るべき段階にあります。 Unit 42の最新観測によれば、React Server Components(RSC)のFlightプロトコルに起因するRCE(CVE-2025-55182)を足掛かりとして、中国国家安全部(MSS)と関連が疑われるCL-STA-1015(UNC5174)による侵害活動がすでに確認されています。
  • 0
  • 0
  • 0
  • 17h ago
Profile picture
CVE-2025-55182 Analysis Report (Honeypot data, indicators)
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
React Server Componentsにおける脆弱性について(CVE-2025-55182) | 情報セキュリティ | IPA 独立行政法人 情報処理推進機構 https://www.ipa.go.jp/security/security-alert/2025/alert20251209.html
  • 0
  • 0
  • 1
  • 16h ago
Profile picture
巨洞復現:CVE-2025-55182
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations https://cstu.io/a4f459 #developer #techno #programmer
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
> React Server Componentsにおける脆弱性について(CVE-2025-55182) https://www.ipa.go.jp/security/security-alert/2025/alert20251209.html
  • 0
  • 0
  • 0
  • 14h ago
Profile picture
"Multiple China-linked threat actors began exploiting the CVE-2025-55182, also known as the React2Shell flaw, within hours, according to AWS Security" securityaffairs.com/185436/secur... "help customers running React or Next.js applications in their own environments take immediate action" #cybersec
  • 0
  • 0
  • 0
  • 11h ago
Profile picture
The React2Shell Paradox: When a Helpful Hacker Patches Your Servers, Should You Panic? Introduction: A new and unusual threat actor is actively exploiting the critical React2Shell vulnerability (CVE-2025-55182) in exposed React Server Components, but with a bizarre twist: after gaining access,…
  • 0
  • 0
  • 0
  • 10h ago
Profile picture
📌 North Korean Hackers Suspected in React2Shell Attacks Exploiting CVE-2025-55182 https://www.cyberhub.blog/article/16561-north-korean-hackers-suspected-in-react2shell-attacks-exploiting-cve-2025-55182
  • 0
  • 0
  • 0
  • 1h ago
Profile picture
The latest update for #Sentrium includes "React and Next.js unauthenticated remote code execution (CVE-2025-55182, CVE-2025-66478)" and "How to measure the ROI of #penetrationtesting and cyber security investments". #Cybersecurity #PenTesting #infosec https://opsmtrs.com/3aPKkxS
  • 0
  • 0
  • 0
  • 22h ago
Profile picture
The latest update for #Wallarm includes "Update on React Server Components RCE Vulnerability (CVE-2025-55182 / CVE-2025-66478)". #cybersecurity #APISecurity #AppSec https://opsmtrs.com/453oM6P
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • Ivanti
  • Endpoint Manager

09 Dec 2025
Published
09 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.6)
EPSS
Pending

KEV

Description

Stored XSS in Ivanti Endpoint Manager prior to version 2024 SU4 SR1 allows a remote unauthenticated attacker to execute arbitrary JavaScript in the context of an administrator session. User interaction is required.

Statistics

  • 3 Posts

Last activity: 3 hours ago

Fediverse

Profile picture

Here We Go Again With Another Critical Ivanti Endpoint Manager Bug

I feel like this is groundhog day as we have yet another critical Ivanti Endpoint Manager bug to deal with. This time around versions 2024 SU4 and below are vulnerable to stored cross-site scripting enabling attackers to remotely execute JavaScript code. Tracked as CVE-2025-10573 with a CVSS score of 9.6 out of 10. The vulnerability was patched on December 9, 2025 so you should patch all the things now.

itnerd.blog/2025/12/09/here-we

  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture
🚨 Earlier this year, Rapid7 researchers discovered a stored cross-site scripting (XSS) vuln. in #Ivanti Endpoint Manager (EPM) – affecting versions 2024 SU4 and below. Now patched, CVE-2025-10573 has been assigned a CVSS score of 9.6. More in our blog: r-7.co/4rN6TWo
  • 0
  • 0
  • 0
  • 6h ago
Profile picture
Ivanti warns of critical Endpoint Manager code execution flaw (CVE-2025-10573) #patchmanagement
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Apache Software Foundation
  • Apache Tika core
  • org.apache.tika:tika-core

04 Dec 2025
Published
05 Dec 2025
Updated

CVSS
Pending
EPSS
0.05%

KEV

Description

Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable. Second, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the "org.apache.tika:tika-parsers" module.

Statistics

  • 2 Posts

Last activity: 8 hours ago

Bluesky

Profile picture
📌 Critical XXE Vulnerability in Apache Tika (CVE-2025-66516) Poses Severe Risk https://www.cyberhub.blog/article/16531-critical-xxe-vulnerability-in-apache-tika-cve-2025-66516-poses-severe-risk
  • 0
  • 0
  • 0
  • 17h ago
Profile picture
Critical CVE-2025-66516 Exposes Apache Tika to XXE Attacks Across Core and Parser Modules #Apache #ApacheVulnerability #Criticalsecurityflaw
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • calcom
  • cal.com

03 Dec 2025
Published
03 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.9)
EPSS
0.10%

KEV

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Statistics

  • 2 Posts

Last activity: 18 hours ago

Fediverse

Profile picture

Cal.com has patched a critical authentication bypass (CVE-2025-66489) that allowed attackers to submit any non-empty TOTP field and skip password checks. Versions ≤5.9.7 were impacted.

Update to 5.9.8 to ensure both password and TOTP verification are enforced.
How should MFA implementations be validated to prevent logic gaps like this?

Source: gbhackers.com/critical-cal-com

Share your insights and follow us for more security reporting.

  • 0
  • 0
  • 0
  • 18h ago

Bluesky

Profile picture
Cal. com patched a critical auth bypass (CVE-2025-66489) where providing any non-empty TOTP field skipped password verification. Versions up to 5.9.7 were affected. Update to 5.9.8 for proper password + TOTP validation. #cybersecurity #authentication #AppSec #Vulnerability #InfoSec #SecurityUpdate
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Microsoft
  • Windows 10 Version 1809

09 Dec 2025
Published
09 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
Pending

KEV

Description

Improper neutralization of special elements used in a command ('command injection') in Windows PowerShell allows an unauthorized attacker to execute code locally.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 3 hours ago

Overview

  • Microsoft
  • Windows 10 Version 1809

09 Dec 2025
Published
09 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
Pending

Description

Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 4 hours ago

Fediverse

Profile picture

Here's the EITW one. It's an LPE in Cloud Files Mini Filter Driver.

msrc.microsoft.com/update-guid

  • 0
  • 1
  • 0
  • 6h ago

Bluesky

Profile picture
~Cisa~ CISA adds actively exploited WinRAR (CVE-2025-6218) and Windows (CVE-2025-62221) vulnerabilities to its KEV catalog, requiring federal remediation. - IOCs: CVE-2025-6218, CVE-2025-62221 - #CISA #KEV #ThreatIntel
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 6 Interactions

Last activity: 13 hours ago

Fediverse

Profile picture

#OpenAI #Codex CLI war angreifbar - da hätte man alles rausziehen und unterjubeln können.

borncity.com/blog/2025/12/09/k

  • 4
  • 2
  • 0
  • 13h ago

Overview

  • SAML-Toolkits
  • ruby-saml

09 Dec 2025
Published
09 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.06%

KEV

Description

The ruby-saml library implements the client side of an SAML authorization. Versions up to and including 1.12.4, are vulnerable to authentication bypass through the libxml2 canonicalization process used by Nokogiri for document transformation, which allows an attacker to execute a Signature Wrapping attack. When libxml2’s canonicalization is invoked on an invalid XML input, it may return an empty string rather than a canonicalized node. ruby-saml then proceeds to compute the DigestValue over this empty string, treating it as if canonicalization succeeded. This issue is fixed in version 1.18.0.

Statistics

  • 1 Post
  • 4 Interactions

Last activity: 16 hours ago

Fediverse

Profile picture

🚩 CRITICAL: CVE-2025-66568 in ruby-saml (<1.18.0) allows SAML signature bypass via XML canonicalization flaw. Patch to 1.18.0+ ASAP to protect SSO! Details: radar.offseq.com/threat/cve-20

  • 3
  • 1
  • 0
  • 16h ago

Overview

  • SAP_SE
  • SAP Solution Manager

09 Dec 2025
Published
09 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
0.05%

KEV

Description

Due to missing input sanitation, SAP Solution Manager allows an authenticated attacker to insert malicious code when calling a remote-enabled function module. This could provide the attacker with full control of the system hence leading to high impact on confidentiality, integrity and availability of the system.

Statistics

  • 2 Posts

Last activity: 14 hours ago

Fediverse

Profile picture

🚨 CRITICAL: CVE-2025-42880 in SAP Solution Manager ST 720 enables authenticated attackers to inject code via remote-enabled modules—full system compromise possible. Apply SAP patches, restrict access, and monitor logs now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 18h ago
Profile picture

SAP Solution Manager: risolta una falla critica di con Severity CVSS da 9.9

SAP ha appena pubblicato l’ultimo aggiornamento di sicurezza annuale, che riporta 14 nuovi bug di sicurezza sanati. Tra questi unasupport.sap.com/en/my-support/…falla critica di “iniezione di codice” nel SAP Solution Manager rappresenta un rischio elevato per l’integrità dei sistemi aziendali, con un indice di gravità molto vicino al massimo.

Questa vulnerabilità, che vanta un punteggio CVSS pari a 9,9, viene etichettata come “Critica”. La sua origine risiede nell’assenza di una corretta sanificazione degli input, ciò che permette ad un utente malintenzionato, una volta autenticato, di eseguire del codice dannoso attraverso la richiamata di un modulo di funzione che può essere abilitato da remoto.

In questa collection di fix emergono altre due note critiche:

  • Vulnerabilità di Apache Tomcat in Commerce Cloud: SAP ha corretto diverse vulnerabilità che interessano Apache Tomcat in SAP Commerce Cloud. Queste falle , tra cui CVE-2025-55754, hanno un punteggio CVSS critico di 9,6.
  • Deserializzazione in jConnect: è stata corretta una vulnerabilità di deserializzazione ad alto rischio nell’SDK SAP jConnect per ASE. Questa falla (CVE-2025-42928), classificata CVSS 9.1, poteva consentire a un utente privilegiato di avviare l’esecuzione di codice remoto in condizioni specifiche.

Una delle preoccupazioni più significative è rappresentata dal CVE-2025-42880, una falla di sicurezza di tipo Code Injection che interessa SAP Solution Manager, soprattutto nella versione ST 720.

La compromissione della riservatezza, dell’integrità e della disponibilità potrebbe essere totale se un aggressore ottenesse il pieno controllo del sistema grazie a uno sfruttamento efficace. Le conseguenze sarebbero infatti molto serie.

Oltre agli avvisi critici, sono stati affrontati diversi problemi di elevata gravità:

  • Esposizione di dati sensibili (CVE-2025-42878): è stato scoperto che SAP Web Dispatcher e Internet Communication Manager (ICM) possono potenzialmente esporre le interfacce di test interne. Se lasciati abilitati, gli aggressori non autenticati potrebbero “accedere alla diagnostica, inviare richieste contraffatte o interrompere i servizi”.
  • Denial of Service (DoS): sono state corrette due vulnerabilità DoS separate (CVE-2025-42874 e CVE-2025-48976): una in SAP NetWeaver (servizio remoto per Xcelsius) e l’altra in SAP Business Objects.
  • Corruzione della memoria (CVE-2025-42877): è stato risolto anche un difetto di corruzione della memoria che interessava Web Dispatcher, ICM e SAP Content Server.

E’ fortemente consigliato che gli amministratori esaminino e implementino queste patch, soprattutto la correzione critica per Solution Manager, al fine di assicurare che i loro ambienti SAP continuino a essere protetti anche nel corso del 2026.

L'articolo SAP Solution Manager: risolta una falla critica di con Severity CVSS da 9.9 proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 14h ago

Overview

  • SAP_SE
  • SAP jConnect - SDK for ASE

09 Dec 2025
Published
09 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.42%

KEV

Description

Under certain conditions, a high privileged user could exploit a deserialization vulnerability in SAP jConnect to launch remote code execution. The system may be vulnerable when specially crafted input is used to exploit the vulnerability resulting in high impact on confidentiality, integrity and availability of the system.

Statistics

  • 2 Posts

Last activity: 14 hours ago

Fediverse

Profile picture

🛑 CRITICAL: CVE-2025-42928 in SAP jConnect - SDK for ASE (v16.0.4, 16.1) enables RCE by high-privileged users via deserialization. No user interaction needed. Patch & restrict privileged accounts now! More info: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 21h ago
Profile picture

SAP Solution Manager: risolta una falla critica di con Severity CVSS da 9.9

SAP ha appena pubblicato l’ultimo aggiornamento di sicurezza annuale, che riporta 14 nuovi bug di sicurezza sanati. Tra questi unasupport.sap.com/en/my-support/…falla critica di “iniezione di codice” nel SAP Solution Manager rappresenta un rischio elevato per l’integrità dei sistemi aziendali, con un indice di gravità molto vicino al massimo.

Questa vulnerabilità, che vanta un punteggio CVSS pari a 9,9, viene etichettata come “Critica”. La sua origine risiede nell’assenza di una corretta sanificazione degli input, ciò che permette ad un utente malintenzionato, una volta autenticato, di eseguire del codice dannoso attraverso la richiamata di un modulo di funzione che può essere abilitato da remoto.

In questa collection di fix emergono altre due note critiche:

  • Vulnerabilità di Apache Tomcat in Commerce Cloud: SAP ha corretto diverse vulnerabilità che interessano Apache Tomcat in SAP Commerce Cloud. Queste falle , tra cui CVE-2025-55754, hanno un punteggio CVSS critico di 9,6.
  • Deserializzazione in jConnect: è stata corretta una vulnerabilità di deserializzazione ad alto rischio nell’SDK SAP jConnect per ASE. Questa falla (CVE-2025-42928), classificata CVSS 9.1, poteva consentire a un utente privilegiato di avviare l’esecuzione di codice remoto in condizioni specifiche.

Una delle preoccupazioni più significative è rappresentata dal CVE-2025-42880, una falla di sicurezza di tipo Code Injection che interessa SAP Solution Manager, soprattutto nella versione ST 720.

La compromissione della riservatezza, dell’integrità e della disponibilità potrebbe essere totale se un aggressore ottenesse il pieno controllo del sistema grazie a uno sfruttamento efficace. Le conseguenze sarebbero infatti molto serie.

Oltre agli avvisi critici, sono stati affrontati diversi problemi di elevata gravità:

  • Esposizione di dati sensibili (CVE-2025-42878): è stato scoperto che SAP Web Dispatcher e Internet Communication Manager (ICM) possono potenzialmente esporre le interfacce di test interne. Se lasciati abilitati, gli aggressori non autenticati potrebbero “accedere alla diagnostica, inviare richieste contraffatte o interrompere i servizi”.
  • Denial of Service (DoS): sono state corrette due vulnerabilità DoS separate (CVE-2025-42874 e CVE-2025-48976): una in SAP NetWeaver (servizio remoto per Xcelsius) e l’altra in SAP Business Objects.
  • Corruzione della memoria (CVE-2025-42877): è stato risolto anche un difetto di corruzione della memoria che interessava Web Dispatcher, ICM e SAP Content Server.

E’ fortemente consigliato che gli amministratori esaminino e implementino queste patch, soprattutto la correzione critica per Solution Manager, al fine di assicurare che i loro ambienti SAP continuino a essere protetti anche nel corso del 2026.

L'articolo SAP Solution Manager: risolta una falla critica di con Severity CVSS da 9.9 proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 14h ago
Showing 1 to 10 of 87 CVEs