24h | 7d | 30d

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
04 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
Pending

KEV

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 57 Posts
  • 735 Interactions

Last activity: Last hour

Fediverse

Profile picture

There is an unauthenticated remote code execution vulnerability in React Server Components.

Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.

If your app’s React code does not use a server, your app is not affected by this vulnerability.

CVE-2025-55182

Mastodon server not impacted btw.

react.dev/blog/2025/12/03/crit

  • 44
  • 42
  • 1
  • 18h ago
Profile picture
Hey babe, are you CVE-2025-55182? because you are totally a 10.0 ​:ahri_shy:​ ​:MenheraAmazingwow:​
​:aneobot_explode:​
  • 19
  • 0
  • 0
  • 15h ago
Profile picture

There's an epic react server component RCE exploit making the rounds today.

A proof of concept just dropped. Probably wanna patch this rapidly.

github.com/ejpir/CVE-2025-5518

#React #Javascript #Cybersecurity #breaking

  • 12
  • 8
  • 0
  • 12h ago
Profile picture

There is currently an incident at work due to the remote code execution vulnerability in React (see CVE-2025-55182).

Co-worker: How long will it take to patch the dev server UI?
Me: It's not affected.
Co-worker: How can it not be affected if it uses React?
Me:

  • 8
  • 28
  • 0
  • 16h ago
Profile picture

RCE in React Server Components, impacting React and Next.js. I usually don't say this, but patch right freakin' now. The React CVE listing (CVE-2025-55182) is a perfect 10.

wiz.io/blog/critical-vulnerabi
react.dev/blog/2025/12/03/crit
nextjs.org/blog/CVE-2025-66478

  • 29
  • 19
  • 0
  • 18h ago
Profile picture

Oh Hell yeah. Perfect 10 in React Server Components. 🥳

facebook.com/security/advisori

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

  • 9
  • 12
  • 1
  • 19h ago
Profile picture

"We did a number of refactors [...] This also fixes a critical security vulnerability." 👀

CVE-2025-55182, an RCE in React Server Components just landed:

react.dev/blog/2025/12/03/crit

Enjoy your patching, and make sure to check your bundled frameworks and dependencies.

Here's the commit:
github.com/facebook/react/comm

  • 5
  • 7
  • 0
  • 19h ago
Profile picture

For interested folks, here’s the React PR that fixes CVE-2025-55182 affecting React Server Components (CVSS 10.0 Critical Severity): github.com/facebook/react/pull

Blog post: react.dev/blog/2025/12/03/crit

> Even if your app does not implement any React Server Function endpoints it may still be vulnerable if your app supports React Server Components.

  • 5
  • 3
  • 0
  • 17h ago
Profile picture

39% of Cloud instances need to patch urgently for 100% reliable unauthenticated RCE in React and Next.js

wiz.io/blog/critical-vulnerabi

  • 5
  • 2
  • 0
  • 15h ago
Profile picture
Critical Security Vulnerability in React Server Components

https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components

CVE-2025-55182 CVSS 10.0
  • 5
  • 1
  • 0
  • 19h ago
Profile picture

Cloudflare offers protection against a new high profile vulnerability for React Server Components: CVE-2025-55182. All customers with WAF enabled are automatically protected. blog.cloudflare.com/waf-rules-

  • 3
  • 1
  • 1
  • 18h ago
Profile picture

A #criticalsecurityflaw (CVE-2025-55182) in #ReactServerComponents (#RSC) allows unauthenticated remote code execution. The vulnerability, impacting #React and #Nextjs, stems from unsafe payload processing and affects multiple versions of various packages. Users are advised to apply the available #patches immediately. thehackernews.com/2025/12/crit #tech #media #news

  • 2
  • 0
  • 1
  • 5h ago
Profile picture

Yikes. I always hate the damn red alert anxiety feeling I get when I read articles like the one linked. Its always that time between when something is publically disclosed, and when all packages and dependencies are patched an upgraded when likelihood of attack is highest, and obviously most possible. These two perfect 10/10 CVEs sure look like a doozy. No doubt hundreds of thousands of major things depend on these other major things, and likely hundreds of thousands of more things include them as dependencies or resource-wasting function packs, regardless of whether or not they are actually needed, and even some software puts these components in the chain, even when they're not actively being used.
And the exploit, with nearly 100% success-rate on all affected systems? A simple specially-crafted HTTP request.
aikido.dev/blog/react-nextjs-c

  • 2
  • 0
  • 0
  • 4h ago
Profile picture

LoL. Yep, my first thought is that this new React vuln is going to generate a lot of IR business. I am going to hell.

wiz.io/blog/critical-vulnerabi

  • 1
  • 5
  • 0
  • 10h ago
Profile picture

Do you use react? If so, you might want to update. See wiz.io/blog/critical-vulnerabi

  • 0
  • 1
  • 0
  • 16h ago
Profile picture

As vulnerabilities go, a 10 is as bad as it gets. If you use #React or one of its derivatives (e.g., #Nextjs) you should upgrade Right. Now.

cve.org/CVERecord?id=CVE-2025-

  • 0
  • 1
  • 0
  • 13h ago
Profile picture

⚠️ CRITICAL RCE in React Server Components & Next.js (CVE-2025-55182, CVSS 10.0): Unauthenticated attackers can execute code via unsafe deserialization. Patch React & Next.js now! Details: radar.offseq.com/threat/critic

  • 0
  • 0
  • 0
  • 6h ago
Profile picture

🚨 CVE-2025-55182: CRITICAL React RCE risk for apps using a new feature. No patch yet; exploitation expected. Audit your React usage, enhance monitoring, and prep mitigations now. EU orgs at high risk! radar.offseq.com/threat/react2

  • 0
  • 0
  • 0
  • Last hour
Profile picture

A public service announcement regarding CVEs: one identified vulnerability gets one #CVE.

Each vendor doesn't get their own CVE that corresponds to their security bulletin.

CVE-2025-66478 is REJECTED as duplicate of CVE-2025-55182

#CVE_2025_66478 #CVE_2025_55182 #React #RCE #InfoSec

cve.org/CVERecord?id=CVE-2025-

  • 2
  • 4
  • 0
  • 15h ago
Profile picture

A maximum-severity security flaw has been disclosed in React Server Components (RSC) that, if successfully exploited, could result in remote code execution.

The vulnerability, tracked as CVE-2025-55182, carries a CVSS score of 10.0.

The vulnerability impacts versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of the following npm packages -

  • react-server-dom-webpack
  • react-server-dom-parcel
  • react-server-dom-turbopack

It's worth noting that the vulnerability also affects Next.js using App Router. The issue has been assigned the CVE identifier CVE-2025-66478 (CVSS score: 10.0). It impacts versions >=14.3.0-canary.77, >=15, and >=16. Patched versions are 16.0.7, 15.5.7, 15.4.8, 15.3.6, 15.2.6, 15.1.9, and 15.0.5.

thehackernews.com/2025/12/crit

  • 2
  • 0
  • 0
  • 13h ago
Profile picture

⚠️ Critical RCE Vulnerabilities Discovered in React & Next.js | Wiz Blog

「 Wiz data indicates that 39% of cloud environments contain instances of Next.js or React in versions vulnerable to CVE-2025-55182 and/or CVE-2025-66478. Regarding Next.js, the framework itself is present in 69% of environments. Notably, 61% of those environments have public applications running Next.js, meaning that 44% of all cloud environments have publicly exposed Next.js instances 」

wiz.io/blog/critical-vulnerabi

  • 0
  • 0
  • 0
  • 1h ago

Bluesky

Profile picture
A perfect CVSS 10 🧑🏻‍🍳💋 CVE-2025-55182: Unauthenticated remote code execution vulnerability in React Server Components The vuln is in versions 19.0, 19.1.0, 19.1.1, and 19.2.0: react-server-dom-webpack react-server-dom-parcel react-server-dom-turbopack Upgrade immediately!
  • 120
  • 278
  • 0
  • 18h ago
Profile picture
CVE-2025-55182: Unauthenticated remote code execution vulnerability in React Server Components. If your app supports React Server Components (if your app connects to a server, uses a framework, bundler, or bundler plugin that supports React Server Components) you need to upgrade immediately!
  • 9
  • 17
  • 0
  • 17h ago
Profile picture
RCE in React Server Components, impacting React and Next.js. I usually don't say this, but patch right freakin' now. The React CVE listing (CVE-2025-55182) is a perfect 10. www.wiz.io/blog/crit... react.dev/blog/2025/... nextjs.org/blog/CVE-...
  • 3
  • 7
  • 0
  • 18h ago
Profile picture
here we go again.... CVE-2025-55182 REACT2SHELL 👀 CVSS 10/10 React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack #cybersecurity
  • 1
  • 1
  • 0
  • 16h ago
Profile picture
Critical Security Vulnerability in React Server Components react.dev -> CVE-2025-55182 CVSS 10.0 Original->
  • 0
  • 1
  • 0
  • 19h ago
Profile picture
🚨 React2Shell (CVE-2025-55182) - CVSS 10.0 vulnerability affects 82% of JavaScript apps. Allows unauthenticated RCE. ✅ Patch NOW: React 19.0.1+ & Next.js 15.0.5+ Even apps not using Server Functions are vulnerable! www.cyberkendra.com/2025/12/crit... #React #React2Shell #infosec #Security
  • 0
  • 1
  • 0
  • 5h ago
Profile picture
Summary of CVE-2025-55182 | Vercel News
  • 0
  • 0
  • 0
  • 18h ago
Profile picture
Critical RCE Vulnerabilities in React and Next.js #HackerNews https://www.wiz.io/blog/critical-vulnerability-in-react-cve-2025-55182
  • 0
  • 0
  • 2
  • 18h ago
Profile picture
Responding to CVE-2025-55182: Secure your React and Next.js workloads #googlecloud https://cloud.google.com/blog/products/identity-security/responding-to-cve-2025-55182/ Follow these recommendations to minimize remote code execution risks in React and Next.js from CVE-2025-55182 vulnerabilities.
  • 0
  • 0
  • 0
  • 8h ago
Profile picture
『信頼できないデータをデシリアライズする脆弱性「CVE-2025-55182」』CVSSv3.1で10.0!:【セキュリティ ニュース】JSライブラリ「React」に深刻なRCE脆弱性 - 早急に対応を(1ページ目 / 全1ページ):Security NEXT https://www.security-next.com/177961
  • 0
  • 0
  • 0
  • 8h ago
Profile picture
Google Cloud Armor update on December 03, 2025 https://cloud.google.com/armor/docs/release-notes#December_03_2025 #googlecloud Security The Cloud Armor cve-canary rules include the google-mrs-v202512-id000001-rce signature to help detect and mitigate CVE-2025-55182
  • 0
  • 0
  • 0
  • 8h ago
Profile picture
Admins and defenders gird themselves against maximum-severity server vuln https://www.newsbeep.com/us/329246/ “I usually don’t say this, but patch right freakin’ now,” one researcher wrote. “The React CVE listing (CVE-2025-55182)…
  • 0
  • 0
  • 0
  • 7h ago
Profile picture
💡 Summary: 重大なセキュリティ脆弱性(CVE-2025-55182)が、特定のReactパッケージおよびNext.jsのバージョン(15.xおよび16.x)でApp Routerを使用している場合に影響し、リモートコードの実行を許してしまいます。この問題は、Reactのバージョン19.0.0から19.2.0までおよび、Next.jsのバージョン15.5.7以前および16.0.7以前に影響します。ユーザーは直ちに修正版にアップグレードし、高度なリスクを軽減する必要があります。
  • 0
  • 0
  • 0
  • 3h ago
Profile picture
📢 Faille critique RCE (CVSS 10) dans React Server Components (CVE-2025-55182) – mises à jour urgentes 📝 Selon react.dev, une vulnérabil… https://cyberveille.ch/posts/2025-12-04-faille-critique-rce-cvss-10-dans-react-server-components-cve-2025-55182-mises-a-jour-urgentes/ #CVE_2025_55182 #Cyberveille
  • 0
  • 0
  • 0
  • 2h ago
Profile picture
A public service announcement regarding CVEs: one identified vulnerability gets one CVE. Each vendor doesn't get their own CVE that corresponds to their security bulletin. CVE-2025-66478 is REJECTED as duplicate of CVE-2025-55182 www.cve.org/CVERecord?id...
  • 0
  • 1
  • 0
  • 15h ago
Profile picture
React2Shell (CVE-2025-55182/CVE-2025-66478) https://react2shell.com/
  • 0
  • 0
  • 0
  • 8h ago
Profile picture
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)
  • 0
  • 0
  • 1
  • 3h ago
Profile picture
Catastrophic React Flaw Unleashes Hell: Unauthenticated RCE in Nextjs – Are You Next? Introduction: A seismic shockwave is hitting the web development world with the disclosure of CVE-2025-55182 and CVE-2025-66478, both rated a perfect 10.0 on the CVSS scale. These critical vulnerabilities in…
  • 0
  • 0
  • 0
  • 2h ago
Profile picture
📢 Next.js RSC : détection fiable d’une RCE (CVE-2025-55182 & CVE-2025-66478) 📝 Selon Searchlight Cyber (billet de recherche, 4 décembre 2025), une vulnérab… https://cyberveille.ch/posts/2025-12-04-next-js-rsc-detection-fiable-dune-rce-cve-2025-55182-cve-2025-66478/ #CVE_2025_55182_66478 #Cyberveille
  • 0
  • 0
  • 0
  • 2h ago
Profile picture
ReactおよびNext.jsに、認証不要のリモートコード実行RCEが発見されました。 CVE-2025-55182とCVE-2025-66478で、CVSSは10.0(Critical)。 React Server Componentsのunsafe deserializationが原因で、攻撃者はHTTPリクエストを送るだけでサーバ上で任意コードを実行できます。 react.dev/blog/2025/12...
  • 0
  • 0
  • 0
  • Last hour
Profile picture
Critical RCE bugs found in React & Next.js (CVE-2025-55182, CVE-2025-66478). Unauthenticated attackers can execute code remotely. Patch to latest versions ASAP. WAF recommended as temporary fix. #security #News
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Pending

Pending
Published
03 Dec 2025
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This CVE is a duplicate of CVE-2025-55182.

Statistics

  • 18 Posts
  • 59 Interactions

Last activity: Last hour

Fediverse

Profile picture

RCE in React Server Components, impacting React and Next.js. I usually don't say this, but patch right freakin' now. The React CVE listing (CVE-2025-55182) is a perfect 10.

wiz.io/blog/critical-vulnerabi
react.dev/blog/2025/12/03/crit
nextjs.org/blog/CVE-2025-66478

  • 29
  • 19
  • 0
  • 18h ago
Profile picture

@GossiTheDog Worth mentioning that Next.js appears affected 15.x and 16.x.

nextjs.org/blog/CVE-2025-66478

  • 1
  • 0
  • 0
  • 15h ago
Profile picture

A public service announcement regarding CVEs: one identified vulnerability gets one #CVE.

Each vendor doesn't get their own CVE that corresponds to their security bulletin.

CVE-2025-66478 is REJECTED as duplicate of CVE-2025-55182

#CVE_2025_66478 #CVE_2025_55182 #React #RCE #InfoSec

cve.org/CVERecord?id=CVE-2025-

  • 2
  • 4
  • 0
  • 15h ago
Profile picture

A maximum-severity security flaw has been disclosed in React Server Components (RSC) that, if successfully exploited, could result in remote code execution.

The vulnerability, tracked as CVE-2025-55182, carries a CVSS score of 10.0.

The vulnerability impacts versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of the following npm packages -

  • react-server-dom-webpack
  • react-server-dom-parcel
  • react-server-dom-turbopack

It's worth noting that the vulnerability also affects Next.js using App Router. The issue has been assigned the CVE identifier CVE-2025-66478 (CVSS score: 10.0). It impacts versions >=14.3.0-canary.77, >=15, and >=16. Patched versions are 16.0.7, 15.5.7, 15.4.8, 15.3.6, 15.2.6, 15.1.9, and 15.0.5.

thehackernews.com/2025/12/crit

  • 2
  • 0
  • 0
  • 13h ago
Profile picture

⚠️ Critical RCE Vulnerabilities Discovered in React & Next.js | Wiz Blog

「 Wiz data indicates that 39% of cloud environments contain instances of Next.js or React in versions vulnerable to CVE-2025-55182 and/or CVE-2025-66478. Regarding Next.js, the framework itself is present in 69% of environments. Notably, 61% of those environments have public applications running Next.js, meaning that 44% of all cloud environments have publicly exposed Next.js instances 」

wiz.io/blog/critical-vulnerabi

  • 0
  • 0
  • 0
  • 1h ago

Bluesky

Profile picture
Security Advisory: CVE-2025-66478 https://nextjs.org/blog/CVE-2025-66478
  • 0
  • 1
  • 0
  • 9h ago
Profile picture
⚠ RCE sur React ⚠ Il est 17h30, tu pensais pouvoir rentrer chez toi ? Et non... une exécution de code à distance vient d'être corrigée sur le framework React. Identifiant : CVE-2025-66478 CVSS : 10.0/10 Bon courage et bonne soirée 😅 github.com/vercel/next....
  • 0
  • 0
  • 0
  • 18h ago
Profile picture
Maximum Severity Alert: Critical RCE Flaw Hits Next.js (CVE-2025-66478, CVSS 10.0)
  • 0
  • 0
  • 0
  • 6h ago
Profile picture
RCE React CVE-2025-66478, tellement de PoC déjà 😅 : github.com/assetnote/re... github.com/ejpir/CVE-20...
  • 0
  • 0
  • 0
  • 1h ago
Profile picture
A public service announcement regarding CVEs: one identified vulnerability gets one CVE. Each vendor doesn't get their own CVE that corresponds to their security bulletin. CVE-2025-66478 is REJECTED as duplicate of CVE-2025-55182 www.cve.org/CVERecord?id...
  • 0
  • 1
  • 0
  • 15h ago
Profile picture
React2Shell (CVE-2025-55182/CVE-2025-66478) https://react2shell.com/
  • 0
  • 0
  • 0
  • 8h ago
Profile picture
High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478)
  • 0
  • 0
  • 1
  • 3h ago
Profile picture
Catastrophic React Flaw Unleashes Hell: Unauthenticated RCE in Nextjs – Are You Next? Introduction: A seismic shockwave is hitting the web development world with the disclosure of CVE-2025-55182 and CVE-2025-66478, both rated a perfect 10.0 on the CVSS scale. These critical vulnerabilities in…
  • 0
  • 0
  • 0
  • 2h ago
Profile picture
📢 Next.js RSC : détection fiable d’une RCE (CVE-2025-55182 & CVE-2025-66478) 📝 Selon Searchlight Cyber (billet de recherche, 4 décembre 2025), une vulnérab… https://cyberveille.ch/posts/2025-12-04-next-js-rsc-detection-fiable-dune-rce-cve-2025-55182-cve-2025-66478/ #CVE_2025_55182_66478 #Cyberveille
  • 0
  • 0
  • 0
  • 2h ago
Profile picture
ReactおよびNext.jsに、認証不要のリモートコード実行RCEが発見されました。 CVE-2025-55182とCVE-2025-66478で、CVSSは10.0(Critical)。 React Server Componentsのunsafe deserializationが原因で、攻撃者はHTTPリクエストを送るだけでサーバ上で任意コードを実行できます。 react.dev/blog/2025/12...
  • 0
  • 0
  • 0
  • Last hour
Profile picture
Critical RCE bugs found in React & Next.js (CVE-2025-55182, CVE-2025-66478). Unauthenticated attackers can execute code remotely. Patch to latest versions ASAP. WAF recommended as temporary fix. #security #News
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Microsoft
  • Windows

26 Aug 2025
Published
05 Nov 2025
Updated

CVSS v3.0
HIGH (7.0)
EPSS
0.23%

KEV

Description

Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of .LNK files. Crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-25373.

Statistics

  • 5 Posts
  • 5 Interactions

Last activity: Last hour

Fediverse

Profile picture

Update: Mit dem November-Update 2025 veröffentlichte Microsoft einen "Nicht-Patch-Patch". Recht lautlos wurde der Umgang von Windows mit den *lnk-Dateien geändert, wohl mit dem Ziel, die Sicherheitslücke CVE-2025-9491 zu schließen.

Mehr: maniabel.work/archiv/401

#infosec #infosecnews #lnkfiles #malware #zeroday #BeDiS

  • 1
  • 0
  • 0
  • 15h ago
Profile picture
  • 1
  • 0
  • 0
  • Last hour

Bluesky

Profile picture
Microsoft has silently "mitigated" a high-severity Windows LNK vulnerability (CVE-2025-9491) that multiple state-backed and cybercrime hacking groups have exploited in zero-day attacks. www.bleepingcomputer.com/news/microso...
  • 2
  • 1
  • 0
  • 17h ago
Profile picture
Microsoft quietly fixed a security vulnerability exploited since 2017 in November 2025 updates. The issue, CVE-2025-9491, involves a Windows Shortcut […]
  • 0
  • 0
  • 0
  • 16h ago
Profile picture
マイクロソフト、ゼロデイとして悪用されるWindows LNKの欠陥を密かに「緩和」:CVE-2025-9491 | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/42874/
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • kingaddons
  • King Addons for Elementor – 4,000+ ready Elementor sections, 650+ templates, 70+ FREE widgets for Elementor

31 Oct 2025
Published
01 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.13%

KEV

Description

The King Addons for Elementor – Free Elements, Widgets, Templates, and Features for Elementor plugin for WordPress is vulnerable to privilege escalation in versions 24.12.92 to 51.1.14 . This is due to the plugin not properly restricting the roles that users can register with. This makes it possible for unauthenticated attackers to register with administrator-level user accounts.

Statistics

  • 4 Posts
  • 7 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture

Critical WordPress plugin flaw alert — CVE-2025-8489 (King Addons for Elementor) is being widely exploited.

The vulnerability allowed unauthenticated attackers to assign themselves administrator roles, leading to complete site compromise.

Defiant’s telemetry shows nearly 50,000 exploitation attempts.
If you’re managing WordPress infrastructure, verifying plugin versions and reviewing registration logs is strongly recommended.

Source: securityweek.com/critical-king

💬 What mitigation practices do you use to reduce plugin-related risks?
🔁 Follow for unbiased security updates.

  • 0
  • 0
  • 0
  • 18h ago
Profile picture

⚠️ Active exploit: CRITICAL flaw in King Addons for Elementor (WordPress) lets unauth attackers register as admins (CVE-2025-8489). Patch to 51.1.35+ ASAP, audit admin accounts, monitor /wp-admin/admin-ajax.php. radar.offseq.com/threat/wordpr

  • 0
  • 0
  • 0
  • 4h ago

Bluesky

Profile picture
Attackers are exploiting a critical-severity privilege escalation vulnerability (CVE-2025-8489) in the King Addons for Elementor plugin for WordPress, which lets them obtain administrative permissions during the registration process.
  • 3
  • 4
  • 0
  • 13h ago
Profile picture
A critical WordPress issue (CVE-2025-8489) in the King Addons for Elementor plugin is under active mass exploitation. The flaw let attackers create accounts with administrator privileges, giving them full control of affected sites. #CyberSecurity #WordPressSecurity #Elementor #ThreatIntel
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Pending

11 Jun 2021
Published
04 Dec 2025
Updated

CVSS
Pending
EPSS
52.65%

Description

OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remote authenticated users to upload and execute arbitrary JSP files via view_edit.shtm.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 14 hours ago

Fediverse

Profile picture

Sure CISA says (today) CVE-2021-26828 OpenPLC ScadaBR Unrestricted Upload of File with Dangerous Type Vulnerability is rly bad and being actively exploited by real attackers, but WILL MY TEAM DO THAT?! Nope. They're part of the celebrity vuln. cult.

  • 1
  • 1
  • 0
  • 14h ago

Bluesky

Profile picture
~Cisa~ CISA warns CVE-2021-26828, an OpenPLC ScadaBR file upload vulnerability, is under active exploitation. - IOCs: CVE-2021-26828 - #CVE202126828 #SCADA #ThreatIntel
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • OpenVPN
  • OpenVPN

03 Dec 2025
Published
03 Dec 2025
Updated

CVSS v4.0
MEDIUM (4.6)
EPSS
Pending

KEV

Description

Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client

Statistics

  • 2 Posts
  • 7 Interactions

Last activity: 11 hours ago

Fediverse

Profile picture

Hold up.

Wait a minute.

Something ain't right.

community.openvpn.net/Security

Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client.

  • 2
  • 3
  • 0
  • 14h ago

Bluesky

Profile picture
SIOSセキュリティブログを更新しました。 OpenVPNの脆弱性(Critical: CVE-2025-12106, Medium: CVE-2025-13086, Low: CVE-2025-13751) #sios_tech #security #vulnerability #セキュリティ #脆弱性 #linux #openvpn security.sios.jp/vulnerabilit...
  • 1
  • 1
  • 0
  • 11h ago

Overview

  • SQLite

30 May 2019
Published
04 Aug 2024
Updated

CVSS
Pending
EPSS
10.60%

KEV

Description

SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.

Statistics

  • 1 Post
  • 11 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture

And there's F5 again. Publishing impact to some of their shit by CVE-2019-8457. Yes, that CVE was published on 30 May 2019 and F5 is just now publishing an advisory for it. And there is impact.

my.f5.com/manage/s/article/K00

  • 5
  • 6
  • 0
  • 15h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 3 Posts

Last activity: 7 hours ago

Fediverse

Profile picture

CISA has added two Android Framework 0-days (CVE-2025-48572 & CVE-2025-48633) to the KEV list, confirming active exploitation.

Together, they enable privilege escalation and information disclosure, forming a potentially complete compromise path for targeted devices.

Federal agencies have a December 23 patch deadline, and wider organizations are encouraged to roll out updates and monitor for related indicators.

💬 Mobile ecosystems remain a critical attack surface - what best practices have worked for your teams?

Source: cybersecuritynews.com/android-

Follow us for ongoing vulnerability and threat intelligence updates.

  • 0
  • 0
  • 0
  • 20h ago

Bluesky

Profile picture
CISA has added two Android 0-day vulnerabilities to its Known Exploited list, confirming active attacks. CVE-2025-48572 (priv-esc) and CVE-2025-48633 impact the Android Framework and can be chained for broader compromise. #Cybersecurity #ZeroDay #ThreatIntel #KEV #Infosec #SecurityPatching
  • 0
  • 0
  • 0
  • 20h ago
Profile picture
Androidで重大な脆弱性と2件のゼロデイ- 12月セキュリティパッチで緊急修正(CVE-2025-48631,CVE-2025-48633,CVE-2025-48572) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 3 Posts

Last activity: 7 hours ago

Fediverse

Profile picture

CISA has added two Android Framework 0-days (CVE-2025-48572 & CVE-2025-48633) to the KEV list, confirming active exploitation.

Together, they enable privilege escalation and information disclosure, forming a potentially complete compromise path for targeted devices.

Federal agencies have a December 23 patch deadline, and wider organizations are encouraged to roll out updates and monitor for related indicators.

💬 Mobile ecosystems remain a critical attack surface - what best practices have worked for your teams?

Source: cybersecuritynews.com/android-

Follow us for ongoing vulnerability and threat intelligence updates.

  • 0
  • 0
  • 0
  • 20h ago

Bluesky

Profile picture
CISA has added two Android 0-day vulnerabilities to its Known Exploited list, confirming active attacks. CVE-2025-48572 (priv-esc) and CVE-2025-48633 impact the Android Framework and can be chained for broader compromise. #Cybersecurity #ZeroDay #ThreatIntel #KEV #Infosec #SecurityPatching
  • 0
  • 0
  • 0
  • 20h ago
Profile picture
Androidで重大な脆弱性と2件のゼロデイ- 12月セキュリティパッチで緊急修正(CVE-2025-48631,CVE-2025-48633,CVE-2025-48572) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Plesk
  • Plesk

03 Dec 2025
Published
03 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
Pending

KEV

Description

WebPros Plesk before 18.0.73.5 and 18.0.74 before 18.0.74.2 on Linux allows remote authenticated users to execute arbitrary code as root via domain creation. The attacker needs "Create and manage sites" with "Domains management" and "Subdomains management."

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 17 hours ago
Showing 1 to 10 of 36 CVEs