Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns Of Adobe Experience Manager Forms 0-Day Vulnerability Exploited In Attacks

Posted on October 16, 2025October 16, 2025 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) has issued a crucial alert relating to a extreme code execution vulnerability in Adobe Expertise Supervisor Kinds, urging organizations to patch instantly.

Tracked as CVE-2025-54253, this flaw impacts the Java Enterprise Version (JEE) model of the software program and allows attackers to execute arbitrary code on weak methods.

First disclosed by Adobe in early October 2025, the vulnerability has already been exploited within the wild, in line with CISA’s Recognized Exploited Vulnerabilities Catalog.

Adobe Expertise Supervisor Kinds is a well-liked platform for creating and managing digital kinds in enterprise environments, typically utilized by companies for buyer interactions and doc processing.

The unspecified nature of the vulnerability rated with a CVSS rating of 9.8 out of 10 makes it significantly harmful, because it requires no person interplay or authentication to set off.

Attackers can leverage it to realize full management over affected servers, probably resulting in information theft, ransomware deployment, or additional community compromise.

Exploitation and Actual-World Influence

Studies point out that menace actors have begun weaponizing CVE-2025-54253 in focused assaults, although it’s unclear if ransomware teams are concerned at this stage.

Safety researchers from corporations like Mandiant have noticed exploitation makes an attempt in opposition to unpatched situations hosted in cloud environments, the place misconfigurations amplify the danger.

One notable incident concerned a mid-sized monetary providers agency in Europe, the place attackers used the flaw to deploy malware, leading to a short lived service outage and information exfiltration.

CISA added the CVE to its catalog on October 15, 2025, emphasizing that federal businesses should apply mitigations by November 14 or discontinue use of the product.

This aligns with Binding Operational Directive 22-01, which mandates fast response to actively exploited flaws in federal methods. Non-public sector organizations are additionally at excessive threat, particularly these counting on Adobe’s suite for internet content material administration.

Adobe has launched patches for affected variations, together with AEM Kinds 6.5.13 and earlier. Customers ought to apply updates promptly, allow multi-factor authentication, and phase networks to restrict lateral motion.

For cloud deployments, following BOD 22-01 steerage is crucial, together with common vulnerability scanning. This incident underscores the continuing challenges in provide chain safety, as Adobe merchandise are integral to many digital ecosystems.

With exploitation confirmed, specialists warn of potential escalation if patches lag. Organizations ought to prioritize auditing their AEM deployments to remain forward of evolving threats.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Adobe, Attacks, CISA, Experience, Exploited, Forms, Manager, Vulnerability, Warns

Post navigation

Previous Post: Windows BitLocker Vulnerabilities Let Attackers Bypass Security Feature
Next Post: Critical Samba RCE Vulnerability Enables Arbitrary Code Execution

Related Posts

Hackers Accessed Customer Data From Salesforce Cyber Security News
Kibana Crowdstrike Connector Vulnerability Exposes Protected Credentials Cyber Security News
Agentless Access, Sensitive Data Masking, and Smooth Session Playback Cyber Security News
Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets Cyber Security News
5 Deception Solutions that are Changing the Cybersecurity Game  Cyber Security News
New QR Code Attack Via PDFs Evades Detection Systems and Harvest Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Personal Information Compromised in Freedom Mobile Data Breach
  • 5 Threats That Reshaped Web Security This Year [2025]
  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Personal Information Compromised in Freedom Mobile Data Breach
  • 5 Threats That Reshaped Web Security This Year [2025]
  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark