24h | 7d | 30d

Overview

  • Cisco
  • Cisco Secure Email

17 Dec 2025
Published
18 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
4.56%

Description

Cisco is aware of a potential vulnerability.  Cisco is currently investigating and will update these details as appropriate as more information becomes available.

Statistics

  • 5 Posts
  • 13 Interactions

Last activity: 9 hours ago

Fediverse

Profile picture

1/5 React2Shell (CVE-2025-55182) ⚛️
The big one. A CVSS 10.0 in React Server Components. Attackers are sending single HTTP requests to get root access.
⚠️ Status: Active exploitation by APTs and botnets. If you use Next.js, check your version NOW.

Cisco’s Nightmare (CVE-2025-20393) 🛡️
A maximum-severity zero-day in Cisco Secure Email Gateway. APT groups are using it to deploy "AquaShell"—a silent backdoor that hides in your mail logs.
Check for any unauthorized tunneling tools like ReverseSSH.

  • 0
  • 0
  • 0
  • 17h ago

Bluesky

Profile picture
We have identified 120 Cisco Secure Email Gateway/ Cisco Secure Email and Web Manager likely vulnerable to CVE-2025-20393 (over 650 fingerprinted exposed). CVE-2025-20393 is exploited in the wild, with no patch available. Follow Cisco recommendations at sec.cloudapps.cisco.com/security/cen...
  • 5
  • 6
  • 0
  • 9h ago
Profile picture
Data shared in our Vulnerable HTTP Report, tagged 'cve-2025-20393': www.shadowserver.org/what-we-do/n... Dashboard Tree Map view (CVE-2025-20393): dashboard.shadowserver.org/statistics/c...
  • 1
  • 1
  • 0
  • 9h ago
Profile picture
The latest update for #ArcticWolf includes "CVE-2025-20393: Threat Campaign Targeting Cisco Secure Email Gateway, Cisco Secure Email and Web Manager". #cybersecurity #infosec #networks https://opsmtrs.com/2ZFbaTl
  • 0
  • 0
  • 0
  • 15h ago
Profile picture
The latest update for #Corelight includes "Detecting CVE-2025-20393 exploitation: catching UAT-9686 on Cisco appliances" and "How to React(.js) to React2Shell and detecting behaviors to catch the Next(.js) big RCE". #cybersecurity #networks #networksecurity https://opsmtrs.com/3CB9DMm
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
11 Dec 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
44.14%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 2 Posts

Last activity: 8 hours ago

Fediverse

Profile picture

Bonus Drop #105 (2025-12-20): Exploits • Errors • Education

RSC Explorer; Cloudflare Error Page Generator; SQL Quest: The Bank Job

I spent much of Q3 and early Q4 revamping my CMU course. I gave said lecture this past week, and the work for that, along with the need to spend an inordinate amount of time tracking React2Shell nonsense has made December Drops pretty sparse.

If you’re interested in “data-driven threat intelligence” or just cyber-curious, this repo has “A Practical Guide to Cyber Threat Intelligence” and “Operationalizing CTI: Considerations for Security Leaders”. They’re two additional resources I developed for the course, since I found other threat intel content was not really aimed at security leaders (existing or budding ones). Full Typst + Markdown sources are available.

I also finally carved out time to finish up and publish a thinkpiece/essay/whitepaper titled “Children Of The MagentAI” which contains a critical analysis of automation dependency patterns in modern cybersecurity and software development, drawing parallels to aviation’s “magenta line” phenomenon.

(So, I have definitely not been slacking off. 🙂

Today, we have three pretty diverse resources for y’all to ponder. Yes, the “exploits” does have something to with React2Shell, but it’s a super cool way to learn some front-end skills as you also learn more about RSC and how to hack things.

TL;DR

(This is an LLM/GPT-generated summary of today’s Drop. This week, I have been — for lack of a better word — forced into using Gemini, so today’s summary was provided by that model. Sigh. This is also the last Drop that will be using Gemini for the TL;DR.)

  • Dan Abramov’s RSC Explorer provides a hands-on, client-side tool to visualize the React Server Components protocol and understand security vulnerabilities like CVE-2025-55182 (https://rscexplorer.dev/).
  • The Cloudflare Error Page Generator by Anthony Donlon allows users to create fast-loading, customized error pages that mimic Cloudflare’s design to humorously shift blame for site downtime (https://virt.moe/cferr/editor/).
  • SQL Quest: The Bank Job offers a gamified detective story where players solve a robbery by writing complex SQL queries against realistic, messy data to sharpen their analytical skills (https://www.sqlhabit.com/quests/the-bank-job).

RSC Explorer

[🖼 hrbrmstrsdailydrop.wordpress.c…]

Dan Abramov just dropped something genuinely useful for anyone trying to understand what actually happened with the React Server Components vulnerability I keep blathering about and that we’ve been tracking at work. His RSC Explorer (GH) is designed to show how the exploits work under the hood, and has full source for you to play with and expand upon.

If you’ve been following the React2Shell situation at all, you know that CVE-2025-55182 caused a lot of confusion. Part of that confusion stems from the fact that most developers using React Server Components don’t really understand the protocol that makes RSC tick. It’s an implementation detail that React intentionally doesn’t document heavily, which gives the React team flexibility to evolve it, but also means that when something goes wrong, people are left scrambling to understand what they’re even looking at.

React2Shell exploited a flaw in how the RSC protocol handles certain payloads, allowing attackers to achieve remote code execution on vulnerable servers. We saw thousands of exploitation attempts in the wild, with threat actors probing for vulnerable Next.js and other RSC-enabled applications. The vulnerability was serious enough that it drew comparisons to Log4Shell, and while the scope was different, the urgency was real.

Dan’s Explorer lets you step through the RSC protocol in your browser. The whole thing runs client-side, with the server portion running in a web worker, so you’re not making any network requests. But it uses the actual React packages that read and write the RSC protocol, so everything you see is real.

The way it works is pretty clever. You write some server and client code in the left pane, and then you can step through the execution one chunk at a time. You see the raw protocol output, the JSON-like format that React uses to serialize component trees, and then you see what the client reconstructs from that data. It makes visible what’s normally invisible.

There’s even a specific example for CVE-2025-55182, though you have to select version 19.2.0 in the corner to see it work since that was the vulnerable version. Being able to actually watch the exploit flow through the protocol is educational in a way that reading about it just isn’t.

Beyond the security angle, the tool is just a really nice way to build intuition for how RSC actually works. You can watch streaming in action, see how Suspense boundaries create “holes” that get filled in as data arrives, understand how client components get referenced rather than having their code sent over the wire, and see how server actions work in the opposite direction. There’s an example showing how a router refresh works without a framework, which demystifies a lot of the magic that Next.js and similar frameworks provide.

As noted, the source is available on GitHub if you want to dig into how he built it, and the whole thing is embeddable so you can include live examples in your own documentation or blog posts.

If you’re doing any work with RSC, or if you’re just curious about what was actually happening with React2Shell at the protocol level, I’d encourage you to spend some time with this and the blog post walking through it.

Cloudflare Error Page Generator

[🖼 hrbrmstrsdailydrop.wordpress.c…]

This definitely made the rounds, but it deserves some preservation in the Drop.

Cloudflare is one of the most harmful and evil corporations to have ever existed. It’s one of those “you have to be a sociopath to work there” kind of places, and they’ve likely irreparably harmed what was the open internet. Some of you will also remember they took down most of said internet a couple times in the past few weeks.

This project (GH) by Anthony Donlon creates customized error pages that mimics the very well-known Cloudflare error page. You can also embed it into your website, and put the blame on them when your own site goes down (but that may send a signal you use Cloudflare, which I would be somewhat embarassed to even remotely have errantly associated with me).

The editor is super-easy to use, and the pages do not load any other static resources, so they are served up super fast, unlike all the sites Cloudflare took down this past year due to sheer incompetence.

There are some examples you can poke through to see what’s possible in terms of customization, and the sources for the editor and pages themselves are very grok-able, especially if you’re looking to get better at javascript/typescript.

SQL Quest: The Bank Job

[🖼 hrbrmstrsdailydrop.wordpress.c…]

I do code “katas” all the time to keep concepts and syntax fresh in active, human RAM. While I tend to do this with practical mini-projects, there are times I find it a bit more fun when there’s gamification involved, especially when it’s framed as a mystery to solved (we’ve covered more than a few of these types of things in previous Drops).

Either this week or last week I came across a neat way to practice SQL that doesn’t feel like practice at all. SQL Habit just released something called SQL Quest, and the first one is called “The Bank Job.” The premise is simple: a bank has been robbed, and you’re the detective. Your job is to follow the trail of evidence through the bank’s database, figure out what happened, and ultimately help Interpol catch the thief. You solve puzzles by writing SQL queries, and each chapter teaches you something new while advancing the story.

Most SQL tutorials teach you syntax in isolation. You learn how to write a JOIN or a window function, but you’re working with clean, obvious data where the answer is basically handed to you. Real data work is 100% definitely NOT like that. Real data work is messy and ambiguous, and you have to figure out what question to even ask before you can write the query to answer it.

The Bank Job uses realistic, messy data and gives you context and clues instead of step-by-step instructions. You have to turn those clues into insights, which is much closer to actual data analysis work. The creator, Anatoli Makarevich, comes from a background building startups and working on growth and BI at Blinkist, so he’s clearly seen the difference between textbook SQL and the kind of SQL you actually need to get things done.

The whole thing takes somewhere between 20 minutes and an hour depending on your skill level. If you can write window functions without looking anything up, you’ll breeze through it. If you’re still building those muscles, plan for the longer end and use it as a learning opportunity. Each chapter has three levels of hints if you get stuck, though using them adds time penalties if you’re competing for the leaderboard.

It’s completely free and doesn’t require a credit card or bitcoin wallet. If you’re looking for a way to sharpen your SQL skills that’s more engaging than working through another set of exercises about employees and departments, this seems like a pretty spiffy option.

FIN

Remember, you can follow and interact with the full text of The Daily Drop’s free posts on:

  • 🐘 Mastodon via @dailydrop.hrbrmstr.dev@dailydrop.hrbrmstr.dev
  • 🦋 Bluesky via https://bsky.app/profile/dailydrop.hrbrmstr.dev.web.brid.gy

☮️

  • 0
  • 0
  • 0
  • 8h ago
Profile picture

1/5 React2Shell (CVE-2025-55182) ⚛️
The big one. A CVSS 10.0 in React Server Components. Attackers are sending single HTTP requests to get root access.
⚠️ Status: Active exploitation by APTs and botnets. If you use Next.js, check your version NOW.

Cisco’s Nightmare (CVE-2025-20393) 🛡️
A maximum-severity zero-day in Cisco Secure Email Gateway. APT groups are using it to deploy "AquaShell"—a silent backdoor that hides in your mail logs.
Check for any unauthorized tunneling tools like ReverseSSH.

  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Meta
  • react-server-dom-webpack

11 Dec 2025
Published
15 Dec 2025
Updated

CVSS v3.1
HIGH (7.5)
EPSS
13.93%

KEV

Description

A pre-authentication denial of service vulnerability exists in React Server Components versions 19.0.0, 19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints, which can cause an infinite loop that hangs the server process and may prevent future HTTP requests from being served.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 12 hours ago

Bluesky

Profile picture
Unmasking CVE-2025-55184: How a Simple Nextjs SSR Loop Can Cripple Your Enterprise Application + Video Introduction: A recently disclosed vulnerability, CVE-2025-55184, exposes a critical server-side rendering (SSR) flaw in Next.js applications that can lead to a complete Denial of Service (DoS).…
  • 0
  • 1
  • 0
  • 12h ago

Overview

  • WatchGuard
  • Fireware OS

19 Dec 2025
Published
19 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.21%

KEV

Description

An Out-of-bounds Write vulnerability in WatchGuard Fireware OS may allow a remote unauthenticated attacker to execute arbitrary code. This vulnerability affects both the Mobile User VPN with IKEv2 and the Branch Office VPN using IKEv2 when configured with a dynamic gateway peer.This vulnerability affects Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.5 and 2025.1 up to and including 2025.1.3.

Statistics

  • 1 Post

Last activity: 18 hours ago

Fediverse

Profile picture

⚠️ Active exploitation alert: WatchGuard Fireware OS hit by CRITICAL VPN vuln (CVE-2025-14733). Remote, unauthenticated RCE risk via IKEv2 configs. Patch now, restrict VPN access, and monitor logs for large CERT payloads. More: radar.offseq.com/threat/watchg

  • 0
  • 0
  • 0
  • 18h ago

Overview

  • CMSSuperHeroes
  • Flex Store Users

20 Dec 2025
Published
20 Dec 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
Pending

KEV

Description

The Flex Store Users plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.0. This is due to the 'fsUserHandle::signup' and the 'fsSellerRole::add_role_seller' functions not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site. Note: The vulnerability can be exploited with the 'fs_type' parameter if the Flex Store Seller plugin is also activated.

Statistics

  • 1 Post

Last activity: 20 hours ago

Fediverse

Profile picture

⚠️ CRITICAL: CVE-2025-13619 impacts all versions of CMSSuperHeroes Flex Store Users plugin for WordPress. Unauthenticated attackers can create admin accounts via improper privilege checks. Disable plugin, audit users, monitor for updates. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 20h ago

Overview

  • World Wide Broadcast Network
  • AVideo

19 Dec 2025
Published
19 Dec 2025
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

AVideo versions 14.3.1 prior to 20.1 contain an unauthenticated remote code execution vulnerability caused by predictable generation of an installation salt using PHP uniqid(). The installation timestamp is exposed via a public endpoint, and a derived hash identifier is accessible through unauthenticated API responses, allowing attackers to brute-force the remaining entropy. The recovered salt can then be used to encrypt a malicious payload supplied to a notification API endpoint that evaluates attacker-controlled input, resulting in arbitrary code execution as the web server user.

Statistics

  • 1 Post

Last activity: 22 hours ago

Fediverse

Profile picture

🚨 CVE-2025-34433: CRITICAL RCE in AVideo ≤14.3.1. Predictable salts + exposed endpoints = unauthenticated code execution! Upgrade to 20.1+ or lock down vulnerable APIs. Full details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Oracle Corporation
  • Oracle Concurrent Processing

05 Oct 2025
Published
21 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
74.64%

Description

Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in takeover of Oracle Concurrent Processing. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Statistics

  • 1 Post

Last activity: 17 hours ago

Fediverse

Profile picture

2/3 The Oracle EBS Breach 🏦
Clop ransomware is back, targeting Oracle EBS (CVE-2025-61882). They’ve already hit GlobalLogic and several NHS providers.
Supply chain attacks are the new "Front Door" for ransomware.

Analysis: Why is this happening?
Attackers are moving up the stack. They aren't just hacking servers; they're hacking the Frameworks (React) and the Infrastructure (Cisco). One vulnerability now grants access to 1,000s of companies at once.

  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Google
  • Chrome

16 Dec 2025
Published
18 Dec 2025
Updated

CVSS
Pending
EPSS
0.13%

KEV

Description

Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 9 hours ago

Bluesky

Profile picture
Critical security update for #Chromium on #Fedora 42. The just-released version 143.0.7499.146 closes two dangerous memory corruption holes (CVE-2025-14765 / CVE-2025-14766) that could lead to heap corruption and remote compromise. Read more: 👉 tinyurl.com/42bm3eb2 #Security
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Google
  • Chrome

16 Dec 2025
Published
18 Dec 2025
Updated

CVSS
Pending
EPSS
0.09%

KEV

Description

Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 9 hours ago

Bluesky

Profile picture
Critical security update for #Chromium on #Fedora 42. The just-released version 143.0.7499.146 closes two dangerous memory corruption holes (CVE-2025-14765 / CVE-2025-14766) that could lead to heap corruption and remote compromise. Read more: 👉 tinyurl.com/42bm3eb2 #Security
  • 0
  • 0
  • 0
  • 9h ago
Showing 1 to 9 of 9 CVEs