Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns Of Adobe Experience Manager Forms 0-Day Vulnerability Exploited In Attacks

Posted on October 16, 2025October 16, 2025 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) has issued a crucial alert relating to a extreme code execution vulnerability in Adobe Expertise Supervisor Kinds, urging organizations to patch instantly.

Tracked as CVE-2025-54253, this flaw impacts the Java Enterprise Version (JEE) model of the software program and allows attackers to execute arbitrary code on weak methods.

First disclosed by Adobe in early October 2025, the vulnerability has already been exploited within the wild, in line with CISA’s Recognized Exploited Vulnerabilities Catalog.

Adobe Expertise Supervisor Kinds is a well-liked platform for creating and managing digital kinds in enterprise environments, typically utilized by companies for buyer interactions and doc processing.

The unspecified nature of the vulnerability rated with a CVSS rating of 9.8 out of 10 makes it significantly harmful, because it requires no person interplay or authentication to set off.

Attackers can leverage it to realize full management over affected servers, probably resulting in information theft, ransomware deployment, or additional community compromise.

Exploitation and Actual-World Influence

Studies point out that menace actors have begun weaponizing CVE-2025-54253 in focused assaults, although it’s unclear if ransomware teams are concerned at this stage.

Safety researchers from corporations like Mandiant have noticed exploitation makes an attempt in opposition to unpatched situations hosted in cloud environments, the place misconfigurations amplify the danger.

One notable incident concerned a mid-sized monetary providers agency in Europe, the place attackers used the flaw to deploy malware, leading to a short lived service outage and information exfiltration.

CISA added the CVE to its catalog on October 15, 2025, emphasizing that federal businesses should apply mitigations by November 14 or discontinue use of the product.

This aligns with Binding Operational Directive 22-01, which mandates fast response to actively exploited flaws in federal methods. Non-public sector organizations are additionally at excessive threat, particularly these counting on Adobe’s suite for internet content material administration.

Adobe has launched patches for affected variations, together with AEM Kinds 6.5.13 and earlier. Customers ought to apply updates promptly, allow multi-factor authentication, and phase networks to restrict lateral motion.

For cloud deployments, following BOD 22-01 steerage is crucial, together with common vulnerability scanning. This incident underscores the continuing challenges in provide chain safety, as Adobe merchandise are integral to many digital ecosystems.

With exploitation confirmed, specialists warn of potential escalation if patches lag. Organizations ought to prioritize auditing their AEM deployments to remain forward of evolving threats.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:0Day, Adobe, Attacks, CISA, Experience, Exploited, Forms, Manager, Vulnerability, Warns

Post navigation

Previous Post: Windows BitLocker Vulnerabilities Let Attackers Bypass Security Feature
Next Post: Critical Samba RCE Vulnerability Enables Arbitrary Code Execution

Related Posts

AMD Zen 5 Processors RDSEED Vulnerability Breaks Integrity With Randomness Cyber Security News
VMware Workstation and Fusion 25H2 Released with New Features and Latest OS Support Cyber Security News
Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation Cyber Security News
Critical Grafana Vulnerability Let Attackers Escalate Privilege Cyber Security News
Blockchain Security – Protecting Decentralized Systems Cyber Security News
New Obex Tool Blocks EDR Dynamic Libraries From Loading at Runtime Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark