Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Adds Exploited XWiki, VMware Flaws to KEV Catalog

Posted on October 31, 2025October 31, 2025 By CWS

The US cybersecurity company CISA on Thursday expanded its Recognized Exploited Vulnerabilities (KEV) catalog with two safety defects impacting XWiki and VMware merchandise.

The XWiki flaw, tracked as CVE-2025-24893 (CVSS rating of 9.8), is an improper sanitization of search parameters that may be exploited remotely, with out authentication, to inject malicious code through specifically crafted search requests.

Profitable exploitation of the difficulty permits attackers to execute code with the privileges of the online server, to leak delicate info, or disrupt survey operations.

Proof-of-concept (PoC) exploits concentrating on the bug have been out there for roughly half a 12 months and exploitation makes an attempt had been initially noticed in March, albeit they had been flagged as reconnaissance efforts.

Earlier this week, nevertheless, VulnCheck warned {that a} menace actor has been exploiting the XWiki vulnerability to drop a cryptocurrency miner.

The VMware defect, tracked as CVE-2025-41244 (CVSS rating of seven.8), is an area privilege escalation flaw affecting Aria Operations and VMware Instruments that permits authenticated attackers to acquire root privileges on a VM that has VMware Instruments put in and is managed by Aria Operations with SDMP enabled.

Broadcom rolled out fixes for the bug in late September, however failed to say its in-the-wild exploitation. NVISO, which was credited for reporting the difficulty, reported that Chinese language menace actors have been concentrating on the CVE for roughly a 12 months.

On Thursday, Broadcom up to date its advisory, noting that it “has info to recommend that suspected exploitation of CVE-2025-41244 has occurred within the wild”.Commercial. Scroll to proceed studying.

Concurrently, CISA added the CVE, together with the XWiki defect, to the KEV record, urging federal businesses to patch them by November 20, as mandated by Binding Operational Directive (BOD) 22-01.

Associated: CISA Warns of Exploited DELMIA Manufacturing facility Software program Vulnerabilities

Associated: 12 months-Outdated WordPress Plugin Flaws Exploited to Hack Web sites

Associated: Important Home windows Server WSUS Vulnerability Exploited within the Wild

Associated: Lanscope Endpoint Supervisor Zero-Day Exploited within the Wild

Security Week News Tags:Adds, Catalog, CISA, Exploited, Flaws, KEV, VMware, XWiki

Post navigation

Previous Post: Jamf to Go Private Following $2.2 Billion Acquisition by Francisco Partners
Next Post: The MSP Cybersecurity Readiness Guide: Turning Security into Growth

Related Posts

How Scammers Are Using AI to Steal College Financial Aid Security Week News
German Authorities Take Down Crypto Swapping Service eXch Security Week News
Hacker Conversations: Rachel Tobac and the Art of Social Engineering Security Week News
Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data Security Week News
Recently Disrupted DanaBot Leaked Valuable Data for 3 Years Security Week News
Decade-Old Pixie Dust Wi-Fi Hack Still Impacts Many Devices Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach
  • CISA Warns of Linux Kernel Use-After-Free Vulnerability Exploited in Attacks to Deploy Ransomware
  • Hackers Exploiting Cisco IOS XE Vulnerability in the Wild to Deploy BADCANDY Web Shell
  • Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations
  • Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News