24h | 7d | 30d

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
06 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
27.19%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 38 Posts
  • 42 Interactions

Last activity: Last hour

Fediverse

Profile picture

Pretty much every site on our network has been scanned and attempted to be exploited so far for CVE-2025-55182 (React2Shell)

If you didn't patch over the weekend, it might be safe to consider it compromised.

First attempt I see on the logs was on:

2025-12-03 21:00:24 18.182.x.z 403 "POST /_next/static/chunks/react-flight HTTP/1.1" "-" "Mozilla/5.0 (CVE-2025-55182 PoC)"

Before most people were even ware of it.

  • 3
  • 0
  • 0
  • 18h ago
Profile picture

CVE-2025-55182 (Next.js)を悪用した攻撃はついに拡張機能による自動的な攻撃ができるレベルに。

Exec じゃあないんですよ

  • 3
  • 0
  • 0
  • 9h ago
Profile picture

For those trying to determine React2Shell exposure: a reminder that Nuclei exists and this is the perfect use case.
docs.projectdiscovery.io/opens

Test is in the templates repo: github.com/projectdiscovery/nu

  • 1
  • 5
  • 0
  • 12h ago
Profile picture

🚨 In this week’s Threat Alert article, we’re tracking the explosive rise of React2Shell (CVE-2025-55182) attacks. The CrowdSec Network has observed 15,725+ signals in 4 days, a single-day peak of 8,925, and 381 unique IPs already weaponizing the flaw.

Read the full analysis and protect your systems 👉 crowdsec.net/vulntracking-repo

  • 1
  • 1
  • 1
  • 20h ago
Profile picture

Remember when we learned to carefully filter user input, especially before executing that input, and ESPECIALLY when we also learned that deserializing an object from user input had BETTER not have a dangerous constructor? In like 2002?

THAT WAS COOL.

nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 4
  • 0
  • 13h ago
Profile picture

@jssfr AFAIK, the affected packages are react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack → cve.org/CVERecord?id=CVE-2025-

AFAIK, Mastodon doesn't depend on these packages → github.com/mastodon/mastodon/b

cc @renchap

  • 0
  • 1
  • 0
  • 19h ago
Profile picture

Researchers have identified over 30 organizations affected by the React2Shell vulnerability (CVE-2025-55182), which is being exploited by an initial access broker linked to China's Ministry of State Security (MSS). The attacks involve stealing credentials and installing malware, with widespread scanning for the critical vulnerability observed globally.
therecord.media/researchers-tr

  • 0
  • 0
  • 0
  • 18h ago
Profile picture

Two Chinese APTs, Earth Lamia and Jackpot Panda, are actively exploiting the React2Shell vulnerability (CVE-2025-55182) in React's server components, with attacks beginning within hours of its disclosure. This critical vulnerability, rated 10/10, impacts the deserialization process and allows attackers to execute malicious commands without authentication, posing a significant risk due to React's widespread use in web development.
risky.biz/risky-bulletin-apts-

  • 0
  • 0
  • 0
  • 18h ago
Profile picture

🚨 React2Shell (CVE‑2025‑55182) in‑the‑wild exploitation & deep‑dive analysis. Critical RCE across React 19, Next.js & all RSC frameworks. Patch now.
wiz.io/blog/nextjs-cve-2025-55

  • 0
  • 0
  • 0
  • 17h ago
Profile picture

CVE-2025-55182: real shit
sees myself still using react 18 due to issues: I sleep

#thisshitissoass #security #react

  • 0
  • 0
  • 0
  • 9h ago
Profile picture

En las últimas 24 horas se han detectado vulnerabilidades graves en dispositivos KVM chinos, explotación de 13 años en QEMU y fallos que permiten desactivar BitLocker en Windows, además de un análisis profundo de React2Shell y una alerta del FBI sobre secuestros virtuales por manipulación fotográfica, mientras un banco de Chipre fortalece su defensa ante ciberataques con Cloudflare. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 09/12/25 📆 |====

🔓 VULNERABILIDADES GRAVES EN SWITCH KVM CHINO

Un dispositivo de gestión remota de bajo costo fabricado por Sipeed presenta una grave vulnerabilidad que permite la grabación no autorizada de audio y otros fallos de seguridad críticos. Esta brecha pone en riesgo la confidencialidad y la integridad de la información gestionada a través del switch. Recomendamos evaluar el uso de estos dispositivos y aplicar parches o mitigaciones específicas. Conoce más detalles sobre estas fallas y cómo proteger tus sistemas 👉 djar.co/vddme

🛡️ POSESIÓN DE OBJETOS COM PARA DESACTIVAR BITLOCKER

Investigadores han descubierto que múltiples interfaces COM poco documentadas en Windows pueden ser explotadas para desactivar el cifrado Bitlocker sin autorización. Esta técnica podría permitir a atacantes evitar las protecciones de cifrado y acceder a datos sensibles almacenados en discos duros. Es vital reforzar las políticas de seguridad y controlar estrictamente los accesos a estas interfaces internas. Explora el método y recomendaciones para blindar Bitlocker aquí 👉 djar.co/gmEf

🐚 ANÁLISIS PROFUNDO DE LA VULNERABILIDAD REACT2SHELL CVE-2025-55182

Se presenta un estudio técnico detallado sobre la vulnerabilidad React2Shell, que aprovecha errores de deserialización para ejecutar código malicioso en frameworks afectados. El análisis incluye la identificación de cadenas de gadgets, escenarios de explotación, y su impacto en aplicaciones web modernas. Entender esta amenaza es esencial para desarrolladores y equipos de seguridad que buscan proteger sus entornos. Descubre el informe completo y cómo mitigar este riesgo 👉 djar.co/ZV3Jr

📸 ALERTA DEL FBI: SECUESTROS VIRTUALES MEDIANTE MANIPULACIÓN DE FOTOS ONLINE

El FBI ha alertado sobre una modalidad de fraude en la que criminales manipulan fotografías compartidas en redes sociales para crear falsas pruebas de vida de supuestas víctimas y exigir rescates por secuestros virtuales. Esta técnica sofisticada pone en evidencia la importancia de una gestión cuidadosa de la información personal en internet y la implementación de medidas de verificación ante solicitudes sospechosas. Infórmate sobre cómo evitar ser víctima de estas estafas 👉 djar.co/yN5Vwg

🏦 CASO DE ÉXITO: BANCO DE CHIPRE Y CLOUDFLARE PARA DEFENDERSE DE CIBERATAQUES

Uno de los bancos más grandes de Chipre ha logrado eliminar retrasos críticos en la respuesta a ciberataques y mantener la disponibilidad continua de sus servicios esenciales mediante soluciones integradas con Cloudflare. Este caso evidencia cómo las alianzas tecnológicas estratégicas y la implementación de protecciones avanzadas permiten fortalecer la resiliencia de infraestructuras financieras ante amenazas persistentes. Descubre los detalles y aprendizajes clave de esta colaboración 👉 djar.co/Bh1sQG

🐛 EXPLOTACIÓN DE UNA VULNERABILIDAD DE 13 AÑOS EN QEMU

Se ha documentado la explotación de un bug en QEMU, el popular emulador y virtualizador de código abierto, que se remonta a más de una década. Este caso resalta la importancia crítica de mantener actualizado el software de virtualización para evitar que vulnerabilidades antiguas sean aprovechadas por atacantes. Mantener los sistemas parches al día es fundamental para proteger entornos virtuales. Conoce más sobre esta vulnerabilidad y mejores prácticas para mitigación 👉 djar.co/8mhb1

  • 0
  • 0
  • 0
  • Last hour
Profile picture

React Developers: There is a serious vulnerability in React and Next.JS (CVE-2025-55182 / CVE-2025-66478). It affects those using React for the BACKEND (RSC and React Server Functions). It is similar in damage and exploit to log4j. Please upgrade asap.

twp.ai/4isUGk

  • 0
  • 0
  • 0
  • 14h ago

Bluesky

Profile picture
Like others we are seeing attacks attempting to exploit React CVE-2025-55182 at scale, incl. botnet related activity. How successful have these attacks been? You can get a view here, where we track compromised host with Next.js attacking our sensors: dashboard.shadowserver.org/statistics/h...
  • 8
  • 9
  • 0
  • 23h ago
Profile picture
Finally I got an RCE in live website on #CVE-2025-55182 #rce #BugBounty #reactjs #nextjs join my telegram t.me/mr0rh
  • 0
  • 4
  • 0
  • 20h ago
Profile picture
🚨 React2Shell is here. 🚨 CVE-2025-55182 enables unauthenticated RCE in React & Next.js apps. Exploitation is real. Outages already happened. Read the full breakdown 👇 basefortify.eu/posts/2025/1... and consult our #AI assistant and Q & A #React2Shell #CVE #WebSecurity #CyberSecurity 🔥🔐
  • 0
  • 2
  • 0
  • 23h ago
Profile picture
📌 CISA Adds Critical Meta React Server Components RCE Flaw (CVE-2025-55182) to KEV Catalog https://www.cyberhub.blog/article/16499-cisa-adds-critical-meta-react-server-components-rce-flaw-cve-2025-55182-to-kev-catalog
  • 0
  • 0
  • 0
  • 22h ago
Profile picture
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182) | aws.amazon.com/blogs/securi... @awscloud.bsky.social
  • 0
  • 0
  • 0
  • 21h ago
Profile picture
React2Shell (CVE-2025-55182): Critical React Vulnerability | Wiz Blog www.wiz.io/blog/critica...
  • 0
  • 0
  • 0
  • 19h ago
Profile picture
先週公開された脆弱性、React2Shell(CVE-2025-55182)への対応が進んでいる。既に30以上の組織で侵害が確認されている。この活動は、中国の国家安全部(MSS)に関連する初期アクセスブローカーによるものと特定されている。 therecord.media/researchers-...
  • 0
  • 0
  • 0
  • 17h ago
Profile picture
~Zscaler~ A critical RCE vulnerability (CVE-2025-55182, CVSS 10.0) in React Server Components allows unauthenticated code execution. - IOCs: CVE-2025-55182 - #CVE202555182 #RCE #React2Shell #ThreatIntel
  • 0
  • 0
  • 0
  • 15h ago
Profile picture
📣 Within hours of disclosure, threat actors began probing and exploiting #React2Shell (CVE-2025-55182), and the #CVE has now been added to CISA’s KEV catalog. If you run React Server Components, Next.js, or dependent frameworks, patch immediately. More details: buff.ly/PPd3QsF #AppSec
  • 0
  • 0
  • 0
  • 13h ago
Profile picture
📢 Faille critique React2Shell (CVE-2025-55182) massivement exploitée : 77 000 IP exposées, 30+ organisations compromi…📝 … https://cyberveille.ch/posts/2025-12-08-faille-critique-react2shell-cve-2025-55182-massivement-exploitee-77-000-ip-exposees-30-organisations-compromises/ #APT_chinois #Cyberveil…
  • 0
  • 0
  • 0
  • 12h ago
Profile picture
📢 Exploitation éclair de React2Shell (CVE-2025-55182) ciblant React/Next.js par des groupes liés à la Chine 📝 Source: cyble.c… https://cyberveille.ch/posts/2025-12-08-exploitation-eclair-de-react2shell-cve-2025-55182-ciblant-react-next-js-par-des-groupes-lies-a-la-chine/ #CVE_2025_55182 #Cyberveille
  • 0
  • 0
  • 0
  • 12h ago
Profile picture
“Within 24 hours of CVE-2025-55182 being disclosed .. multiple threat actors linked to China attempting to exploit the bug – .. same time frame that saw the Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) release its own warning.” www.cyberdaily.au/security/129...
  • 0
  • 0
  • 0
  • 10h ago
Profile picture
React2Shell(CVE-2025-55182)とは-React Server Components/Next.jsを直撃する脆弱性 rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #サイバー攻撃
  • 0
  • 0
  • 0
  • 10h ago
Profile picture
The latest update for #Harness includes "DBA vs Developer Dynamics: Bridging the Gap with Database #DevOps" and "Protect Against Critical Unauthenticated RCE in React & Next.js (CVE-2025-55182) with Traceable WAF". #CICD #AI https://opsmtrs.com/4hhDUoO
  • 0
  • 0
  • 0
  • 8h ago
Profile picture
The latest update for #UpGuard includes "Solving Human Risk: Build a Measurable, Security-First Culture" and "Understanding and Mitigating CVE-2025-55182 (React2Shell)". #threatdetection #cybersecurity #datasecurity https://opsmtrs.com/3et5kcy
  • 0
  • 0
  • 0
  • 6h ago
Profile picture
CVE-2025-55182(React2Shell)を巡り、複数の中国系国家支援アクターによる積極的な悪用が進行中です。React Server Componentsの脆弱性を起点とする認証不要型RCEにより、攻撃者はcrafted HTTP requestを介して任意コード実行を行い、バックエンドの完全な制御に至ります。 すでにPoCが公開され、攻撃成功率はほぼ100%。Datadogは80以上の攻撃IPによるスキャンを確認し、Recorded Futureは中国国家系の匿名化ネットワークGobRATの関与を示しました。
  • 0
  • 0
  • 0
  • 5h ago
Profile picture
React2Shell(CVE-2025-55182)による攻撃は、中国政府による攻撃フェーズに入ったと見るべき段階にあります。 Unit 42の最新観測によれば、React Server Components(RSC)のFlightプロトコルに起因するRCE(CVE-2025-55182)を足掛かりとして、中国国家安全部(MSS)と関連が疑われるCL-STA-1015(UNC5174)による侵害活動がすでに確認されています。
  • 0
  • 0
  • 0
  • 4h ago
Profile picture
CVE-2025-55182 Analysis Report (Honeypot data, indicators)
  • 0
  • 0
  • 0
  • 3h ago
Profile picture
React Server Componentsにおける脆弱性について(CVE-2025-55182) | 情報セキュリティ | IPA 独立行政法人 情報処理推進機構 https://www.ipa.go.jp/security/security-alert/2025/alert20251209.html
  • 0
  • 0
  • 0
  • 3h ago
Profile picture
巨洞復現:CVE-2025-55182
  • 0
  • 0
  • 0
  • 3h ago
Profile picture
Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations https://cstu.io/a4f459 #developer #techno #programmer
  • 0
  • 0
  • 0
  • 3h ago
Profile picture
The Nextjs Nightmare: How a Single Query Parameter Can Give Hackers Root Access Introduction: A critical Server-Side Template Injection (SSTI) vulnerability, tracked as CVE-2025-55182, in Next.js versions 16.0.0 to 16.2.4 allows unauthenticated remote code execution. This flaw transforms a simple…
  • 0
  • 0
  • 0
  • 2h ago
Profile picture
> React Server Componentsにおける脆弱性について(CVE-2025-55182) https://www.ipa.go.jp/security/security-alert/2025/alert20251209.html
  • 0
  • 0
  • 0
  • 1h ago
Profile picture
The latest update for #Sentrium includes "React and Next.js unauthenticated remote code execution (CVE-2025-55182, CVE-2025-66478)" and "How to measure the ROI of #penetrationtesting and cyber security investments". #Cybersecurity #PenTesting #infosec https://opsmtrs.com/3aPKkxS
  • 0
  • 0
  • 0
  • 8h ago
Profile picture
The latest update for #Wallarm includes "Update on React Server Components RCE Vulnerability (CVE-2025-55182 / CVE-2025-66478)". #cybersecurity #APISecurity #AppSec https://opsmtrs.com/453oM6P
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Apache Software Foundation
  • Apache Tika core
  • org.apache.tika:tika-core

04 Dec 2025
Published
05 Dec 2025
Updated

CVSS
Pending
EPSS
0.05%

KEV

Description

Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF. This CVE covers the same vulnerability as in CVE-2025-54988. However, this CVE expands the scope of affected packages in two ways. First, while the entrypoint for the vulnerability was the tika-parser-pdf-module as reported in CVE-2025-54988, the vulnerability and its fix were in tika-core. Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable. Second, the original report failed to mention that in the 1.x Tika releases, the PDFParser was in the "org.apache.tika:tika-parsers" module.

Statistics

  • 3 Posts

Last activity: 4 hours ago

Fediverse

Profile picture

🚨CVE-2025-66516: Critical XXE in Apache Tika tika-core (1.13-3.2.1), tika-pdf-module (2.0.0-3.2.1) and tika-parsers (1.13-1.28.5) modules on all platforms allows an attacker to carry out XML External Entity injection via a crafted XFA file inside of a PDF.

Scanner: github.com/Ashwesker/Blackash-

CVSS: 10
Vendor/Product: Apache Tika

Affected modules:

▪️Apache Tika Core: org.apache.tika:tika-core versions 1.13 through 3.2.1
▪️Apache Tika Parsers: org.apache.tika:tika-parsers versions 1.13 before 2.0.0, In 1.x releases, the PDFParser was bundled in this module.
▪️Apache Tika PDF Parser Module: org.apache.tika:tika-parser-pdf-module versions 2.0.0 through 3.2.1

Advisory: lists.apache.org/thread/s5x3k9

  • 0
  • 0
  • 0
  • 12h ago

Bluesky

Profile picture
Apache Tika XFAを含むPDFファイルを用いて、XXEインジェクションを誘発できる脆弱性 CVE-2025-66516 CVSS 10.0 Critical このXXEによって、サーバー上の任意ファイルの読み出し、SSRF、DoS、さらにはRCEにつながる可能性があります。 影響範囲:Apache Tika の tika-core (1.13〜3.2.1)、tika-pdf-module (2.0.0〜3.2.1)、および tika-parsers (1.13〜1.28.5)
  • 0
  • 0
  • 0
  • 18h ago
Profile picture
📌 Critical XXE Vulnerability in Apache Tika (CVE-2025-66516) Poses Severe Risk https://www.cyberhub.blog/article/16531-critical-xxe-vulnerability-in-apache-tika-cve-2025-66516-poses-severe-risk
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Pending

28 Aug 2022
Published
09 Dec 2025
Updated

CVSS
Pending
EPSS
34.73%

Description

D-Link Go-RT-AC750 GORTAC750_revA_v101b03 and GO-RT-AC750_revB_FWv200b02 are vulnerable to Buffer Overflow via cgibin, hnap_main,

Statistics

  • 4 Posts
  • 2 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture
  • 0
  • 2
  • 0
  • 16h ago
Profile picture

🚨CISA Kev Catalog has added two more vulnerabilities

CVE-2022-37055: D-Link Routers Buffer Overflow Vulnerability

CVSS: 9.8

CVE-2025-66644: Array Networks ArrayOS AG OS Command Injection Vulnerability

CVSS: 7.1

darkwebinformer.com/cisa-kev-c

  • 0
  • 0
  • 0
  • 10h ago

Bluesky

Profile picture
~Cisa~ CISA adds two actively exploited vulnerabilities affecting D-Link routers (CVE-2022-37055) and Array Networks OS (CVE-2025-66644) to its KEV catalog. - IOCs: CVE-2022-37055, CVE-2025-66644 - #CISA #KEV #ThreatIntel
  • 0
  • 0
  • 0
  • 15h ago
Profile picture
CVE-2022-37055 D-Link Routers Buffer Overflow Vulnerability CVE-2025-66644 Array Networks ArrayOS AG OS Command Injection Vulnerability
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • calcom
  • cal.com

03 Dec 2025
Published
03 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.9)
EPSS
0.08%

KEV

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Statistics

  • 2 Posts

Last activity: 4 hours ago

Fediverse

Profile picture

Cal.com has patched a critical authentication bypass (CVE-2025-66489) that allowed attackers to submit any non-empty TOTP field and skip password checks. Versions ≤5.9.7 were impacted.

Update to 5.9.8 to ensure both password and TOTP verification are enforced.
How should MFA implementations be validated to prevent logic gaps like this?

Source: gbhackers.com/critical-cal-com

Share your insights and follow us for more security reporting.

  • 0
  • 0
  • 0
  • 4h ago

Bluesky

Profile picture
Cal. com patched a critical auth bypass (CVE-2025-66489) where providing any non-empty TOTP field skipped password verification. Versions up to 5.9.7 were affected. Update to 5.9.8 for proper password + TOTP validation. #cybersecurity #authentication #AppSec #Vulnerability #InfoSec #SecurityUpdate
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Microsoft
  • Microsoft SharePoint Enterprise Server 2016

08 Jul 2025
Published
21 Oct 2025
Updated

CVSS v3.1
MEDIUM (6.5)
EPSS
62.10%

Description

Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 2 Posts

Last activity: 17 hours ago

Fediverse

Profile picture

📰 SharePoint Flaw Chain Exploited to Deploy Warlock Ransomware

Ransomware alert: Storm-2603 exploits SharePoint flaws (CVE-2025-49706) to deploy Warlock ransomware. Attackers abuse the legitimate DFIR tool 'Velociraptor' to evade detection. Patch SharePoint now! ⚠️ #Ransomware #SharePoint #LotL

🔗 cyber.netsecops.io/articles/sh

  • 0
  • 0
  • 0
  • 17h ago

Bluesky

Profile picture
中国拠点のハッキンググループLinen Typhoon、Violet Typhoon、Storm-2603が、Microsoft SharePointの脆弱性CVE-2025-49704とCVE-2025-49706を悪用するToolShellキャンペーンを展開していた。3グループはほぼ同時期に同じ脆弱性を悪用。 therecord.media/three-hackin...
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Array Networks
  • ArrayOS AG

05 Dec 2025
Published
09 Dec 2025
Updated

CVSS v3.1
HIGH (7.2)
EPSS
0.15%

Description

Array Networks ArrayOS AG before 9.4.5.9 allows command injection, as exploited in the wild in August through December 2025.

Statistics

  • 3 Posts

Last activity: 3 hours ago

Fediverse

Profile picture

🚨CISA Kev Catalog has added two more vulnerabilities

CVE-2022-37055: D-Link Routers Buffer Overflow Vulnerability

CVSS: 9.8

CVE-2025-66644: Array Networks ArrayOS AG OS Command Injection Vulnerability

CVSS: 7.1

darkwebinformer.com/cisa-kev-c

  • 0
  • 0
  • 0
  • 10h ago

Bluesky

Profile picture
~Cisa~ CISA adds two actively exploited vulnerabilities affecting D-Link routers (CVE-2022-37055) and Array Networks OS (CVE-2025-66644) to its KEV catalog. - IOCs: CVE-2022-37055, CVE-2025-66644 - #CISA #KEV #ThreatIntel
  • 0
  • 0
  • 0
  • 15h ago
Profile picture
CVE-2022-37055 D-Link Routers Buffer Overflow Vulnerability CVE-2025-66644 Array Networks ArrayOS AG OS Command Injection Vulnerability
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 6 Interactions

Last activity: Last hour

Fediverse

Profile picture

#OpenAI #Codex CLI war angreifbar - da hätte man alles rausziehen und unterjubeln können.

borncity.com/blog/2025/12/09/k

  • 4
  • 2
  • 0
  • Last hour

Overview

  • SAML-Toolkits
  • ruby-saml

09 Dec 2025
Published
09 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

The ruby-saml library implements the client side of an SAML authorization. Versions up to and including 1.12.4, are vulnerable to authentication bypass through the libxml2 canonicalization process used by Nokogiri for document transformation, which allows an attacker to execute a Signature Wrapping attack. When libxml2’s canonicalization is invoked on an invalid XML input, it may return an empty string rather than a canonicalized node. ruby-saml then proceeds to compute the DigestValue over this empty string, treating it as if canonicalization succeeded. This issue is fixed in version 1.18.0.

Statistics

  • 1 Post
  • 4 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture

🚩 CRITICAL: CVE-2025-66568 in ruby-saml (<1.18.0) allows SAML signature bypass via XML canonicalization flaw. Patch to 1.18.0+ ASAP to protect SSO! Details: radar.offseq.com/threat/cve-20

  • 3
  • 1
  • 0
  • 3h ago

Overview

  • SAP_SE
  • SAP Solution Manager

09 Dec 2025
Published
09 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
Pending

KEV

Description

Due to missing input sanitation, SAP Solution Manager allows an authenticated attacker to insert malicious code when calling a remote-enabled function module. This could provide the attacker with full control of the system hence leading to high impact on confidentiality, integrity and availability of the system.

Statistics

  • 2 Posts

Last activity: 1 hour ago

Fediverse

Profile picture

🚨 CRITICAL: CVE-2025-42880 in SAP Solution Manager ST 720 enables authenticated attackers to inject code via remote-enabled modules—full system compromise possible. Apply SAP patches, restrict access, and monitor logs now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 5h ago
Profile picture

SAP Solution Manager: risolta una falla critica di con Severity CVSS da 9.9

SAP ha appena pubblicato l’ultimo aggiornamento di sicurezza annuale, che riporta 14 nuovi bug di sicurezza sanati. Tra questi unasupport.sap.com/en/my-support/…falla critica di “iniezione di codice” nel SAP Solution Manager rappresenta un rischio elevato per l’integrità dei sistemi aziendali, con un indice di gravità molto vicino al massimo.

Questa vulnerabilità, che vanta un punteggio CVSS pari a 9,9, viene etichettata come “Critica”. La sua origine risiede nell’assenza di una corretta sanificazione degli input, ciò che permette ad un utente malintenzionato, una volta autenticato, di eseguire del codice dannoso attraverso la richiamata di un modulo di funzione che può essere abilitato da remoto.

In questa collection di fix emergono altre due note critiche:

  • Vulnerabilità di Apache Tomcat in Commerce Cloud: SAP ha corretto diverse vulnerabilità che interessano Apache Tomcat in SAP Commerce Cloud. Queste falle , tra cui CVE-2025-55754, hanno un punteggio CVSS critico di 9,6.
  • Deserializzazione in jConnect: è stata corretta una vulnerabilità di deserializzazione ad alto rischio nell’SDK SAP jConnect per ASE. Questa falla (CVE-2025-42928), classificata CVSS 9.1, poteva consentire a un utente privilegiato di avviare l’esecuzione di codice remoto in condizioni specifiche.

Una delle preoccupazioni più significative è rappresentata dal CVE-2025-42880, una falla di sicurezza di tipo Code Injection che interessa SAP Solution Manager, soprattutto nella versione ST 720.

La compromissione della riservatezza, dell’integrità e della disponibilità potrebbe essere totale se un aggressore ottenesse il pieno controllo del sistema grazie a uno sfruttamento efficace. Le conseguenze sarebbero infatti molto serie.

Oltre agli avvisi critici, sono stati affrontati diversi problemi di elevata gravità:

  • Esposizione di dati sensibili (CVE-2025-42878): è stato scoperto che SAP Web Dispatcher e Internet Communication Manager (ICM) possono potenzialmente esporre le interfacce di test interne. Se lasciati abilitati, gli aggressori non autenticati potrebbero “accedere alla diagnostica, inviare richieste contraffatte o interrompere i servizi”.
  • Denial of Service (DoS): sono state corrette due vulnerabilità DoS separate (CVE-2025-42874 e CVE-2025-48976): una in SAP NetWeaver (servizio remoto per Xcelsius) e l’altra in SAP Business Objects.
  • Corruzione della memoria (CVE-2025-42877): è stato risolto anche un difetto di corruzione della memoria che interessava Web Dispatcher, ICM e SAP Content Server.

E’ fortemente consigliato che gli amministratori esaminino e implementino queste patch, soprattutto la correzione critica per Solution Manager, al fine di assicurare che i loro ambienti SAP continuino a essere protetti anche nel corso del 2026.

L'articolo SAP Solution Manager: risolta una falla critica di con Severity CVSS da 9.9 proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 1h ago

Overview

  • SAP_SE
  • SAP jConnect - SDK for ASE

09 Dec 2025
Published
09 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
Pending

KEV

Description

Under certain conditions, a high privileged user could exploit a deserialization vulnerability in SAP jConnect to launch remote code execution. The system may be vulnerable when specially crafted input is used to exploit the vulnerability resulting in high impact on confidentiality, integrity and availability of the system.

Statistics

  • 2 Posts

Last activity: 1 hour ago

Fediverse

Profile picture

🛑 CRITICAL: CVE-2025-42928 in SAP jConnect - SDK for ASE (v16.0.4, 16.1) enables RCE by high-privileged users via deserialization. No user interaction needed. Patch & restrict privileged accounts now! More info: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 8h ago
Profile picture

SAP Solution Manager: risolta una falla critica di con Severity CVSS da 9.9

SAP ha appena pubblicato l’ultimo aggiornamento di sicurezza annuale, che riporta 14 nuovi bug di sicurezza sanati. Tra questi unasupport.sap.com/en/my-support/…falla critica di “iniezione di codice” nel SAP Solution Manager rappresenta un rischio elevato per l’integrità dei sistemi aziendali, con un indice di gravità molto vicino al massimo.

Questa vulnerabilità, che vanta un punteggio CVSS pari a 9,9, viene etichettata come “Critica”. La sua origine risiede nell’assenza di una corretta sanificazione degli input, ciò che permette ad un utente malintenzionato, una volta autenticato, di eseguire del codice dannoso attraverso la richiamata di un modulo di funzione che può essere abilitato da remoto.

In questa collection di fix emergono altre due note critiche:

  • Vulnerabilità di Apache Tomcat in Commerce Cloud: SAP ha corretto diverse vulnerabilità che interessano Apache Tomcat in SAP Commerce Cloud. Queste falle , tra cui CVE-2025-55754, hanno un punteggio CVSS critico di 9,6.
  • Deserializzazione in jConnect: è stata corretta una vulnerabilità di deserializzazione ad alto rischio nell’SDK SAP jConnect per ASE. Questa falla (CVE-2025-42928), classificata CVSS 9.1, poteva consentire a un utente privilegiato di avviare l’esecuzione di codice remoto in condizioni specifiche.

Una delle preoccupazioni più significative è rappresentata dal CVE-2025-42880, una falla di sicurezza di tipo Code Injection che interessa SAP Solution Manager, soprattutto nella versione ST 720.

La compromissione della riservatezza, dell’integrità e della disponibilità potrebbe essere totale se un aggressore ottenesse il pieno controllo del sistema grazie a uno sfruttamento efficace. Le conseguenze sarebbero infatti molto serie.

Oltre agli avvisi critici, sono stati affrontati diversi problemi di elevata gravità:

  • Esposizione di dati sensibili (CVE-2025-42878): è stato scoperto che SAP Web Dispatcher e Internet Communication Manager (ICM) possono potenzialmente esporre le interfacce di test interne. Se lasciati abilitati, gli aggressori non autenticati potrebbero “accedere alla diagnostica, inviare richieste contraffatte o interrompere i servizi”.
  • Denial of Service (DoS): sono state corrette due vulnerabilità DoS separate (CVE-2025-42874 e CVE-2025-48976): una in SAP NetWeaver (servizio remoto per Xcelsius) e l’altra in SAP Business Objects.
  • Corruzione della memoria (CVE-2025-42877): è stato risolto anche un difetto di corruzione della memoria che interessava Web Dispatcher, ICM e SAP Content Server.

E’ fortemente consigliato che gli amministratori esaminino e implementino queste patch, soprattutto la correzione critica per Solution Manager, al fine di assicurare che i loro ambienti SAP continuino a essere protetti anche nel corso del 2026.

L'articolo SAP Solution Manager: risolta una falla critica di con Severity CVSS da 9.9 proviene da Red Hot Cyber.

  • 0
  • 0
  • 0
  • 1h ago
Showing 1 to 10 of 60 CVEs