Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns Of Adobe Experience Manager Forms 0-Day Vulnerability Exploited In Attacks

Posted on October 16, 2025October 16, 2025 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) has issued a crucial alert relating to a extreme code execution vulnerability in Adobe Expertise Supervisor Kinds, urging organizations to patch instantly.

Tracked as CVE-2025-54253, this flaw impacts the Java Enterprise Version (JEE) model of the software program and allows attackers to execute arbitrary code on weak methods.

First disclosed by Adobe in early October 2025, the vulnerability has already been exploited within the wild, in line with CISA’s Recognized Exploited Vulnerabilities Catalog.

Adobe Expertise Supervisor Kinds is a well-liked platform for creating and managing digital kinds in enterprise environments, typically utilized by companies for buyer interactions and doc processing.

The unspecified nature of the vulnerability rated with a CVSS rating of 9.8 out of 10 makes it significantly harmful, because it requires no person interplay or authentication to set off.

Attackers can leverage it to realize full management over affected servers, probably resulting in information theft, ransomware deployment, or additional community compromise.

Exploitation and Actual-World Influence

Studies point out that menace actors have begun weaponizing CVE-2025-54253 in focused assaults, although it’s unclear if ransomware teams are concerned at this stage.

Safety researchers from corporations like Mandiant have noticed exploitation makes an attempt in opposition to unpatched situations hosted in cloud environments, the place misconfigurations amplify the danger.

One notable incident concerned a mid-sized monetary providers agency in Europe, the place attackers used the flaw to deploy malware, leading to a short lived service outage and information exfiltration.

CISA added the CVE to its catalog on October 15, 2025, emphasizing that federal businesses should apply mitigations by November 14 or discontinue use of the product.

This aligns with Binding Operational Directive 22-01, which mandates fast response to actively exploited flaws in federal methods. Non-public sector organizations are additionally at excessive threat, particularly these counting on Adobe’s suite for internet content material administration.

Adobe has launched patches for affected variations, together with AEM Kinds 6.5.13 and earlier. Customers ought to apply updates promptly, allow multi-factor authentication, and phase networks to restrict lateral motion.

For cloud deployments, following BOD 22-01 steerage is crucial, together with common vulnerability scanning. This incident underscores the continuing challenges in provide chain safety, as Adobe merchandise are integral to many digital ecosystems.

With exploitation confirmed, specialists warn of potential escalation if patches lag. Organizations ought to prioritize auditing their AEM deployments to remain forward of evolving threats.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Adobe, Attacks, CISA, Experience, Exploited, Forms, Manager, Vulnerability, Warns

Post navigation

Previous Post: Windows BitLocker Vulnerabilities Let Attackers Bypass Security Feature
Next Post: Critical Samba RCE Vulnerability Enables Arbitrary Code Execution

Related Posts

YONO SBI Banking App Vulnerability Let Attackers Execute a Man-in-the-Middle Attack Cyber Security News
Canada Police Dismantles TradeOgre Platform That Stolen 56 Million Dollars in Cryptocurrency Cyber Security News
10 Best Virtual Machine (VM) Monitoring Tools in 2025 Cyber Security News
Threat Actors Breaking to Enterprise Infrastructure Within 18 Minutes From Initial Access Cyber Security News
IBM QRadar Vulnerabilities Let Attackers Access Sensitive Configuration Files Cyber Security News
Zero-Click Microsoft 365 Copilot Vulnerability Let Attackers Exfiltrates Sensitive Data Abusing Teams Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AISLE Emerges From Stealth With AI-Based Reasoning System That Remediates Vulnerabilities on the Fly
  • Organizations Warned of Exploited Adobe AEM Forms Vulnerability
  • PhantomVAI Loader Attacking Organizations Worldwide to Deliver AsyncRAT, XWorm, FormBook and DCRat
  • How to Assess and Choose the Right AI-SOC Platform
  • Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AISLE Emerges From Stealth With AI-Based Reasoning System That Remediates Vulnerabilities on the Fly
  • Organizations Warned of Exploited Adobe AEM Forms Vulnerability
  • PhantomVAI Loader Attacking Organizations Worldwide to Deliver AsyncRAT, XWorm, FormBook and DCRat
  • How to Assess and Choose the Right AI-SOC Platform
  • Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News