Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network

Posted on May 13, 2025May 14, 2025 By CWS

Microsoft has disclosed a vital reminiscence corruption vulnerability in its Scripting Engine (CVE-2025-30397), which permits unauthorized attackers to execute code remotely over a community.

The flaw, categorized as “Essential” and tracked underneath CWE-843 (Sort Confusion), was launched as a part of the corporate’s Could 2025 Patch Tuesday safety updates.

The vulnerability arises from the Scripting Engine’s improper entry of assets utilizing incompatible sorts, resulting in a kind confusion situation.

This reminiscence corruption concern may be exploited when a consumer interacts with a specifically crafted URL, particularly whereas utilizing Microsoft Edge in Web Explorer Mode. Regardless of the excessive assault complexity, profitable exploitation may lead to full system compromise, impacting the confidentiality, integrity, and availability of affected Home windows techniques.

Exploitability and Impression

To use CVE-2025-30397, an attacker should entice a consumer to click on on a specifically crafted URL. As soon as the consumer interacts with the hyperlink in Edge’s Web Explorer Mode, the attacker can set off the vulnerability, enabling distant code execution on the sufferer’s system.

Which means even techniques in a roundabout way working Web Explorer stay in danger as a result of underlying MSHTML platform, which remains to be energetic in lots of Home windows environments.

Whereas the vulnerability was not publicly disclosed previous to the patch, Microsoft and impartial safety researchers have confirmed that it has been exploited within the wild. Exploitation has been detected, although it requires a number of situations to be met, together with consumer interplay and a particular browser configuration.

CVE-2025-30397 is among the most extreme vulnerabilities addressed within the Could 2025 Patch Tuesday, which mounted a complete of 72 flaws, together with 5 zero-days and 28 distant code execution vulnerabilities.

The Scripting Engine vulnerability stands out as a result of its potential to permit attackers to totally compromise focused techniques remotely.

Mitigations

Microsoft has launched patches addressing this vulnerability for all supported variations of Home windows. Customers and directors are strongly urged to use the newest safety updates instantly to mitigate the chance of exploitation.

Organizations must also overview browser configurations and contemplate disabling Web Explorer Mode the place doable to cut back publicity.

The invention and exploitation of CVE-2025-30397 underscore the continued dangers posed by legacy parts inside fashionable software program environments. Immediate patching and consumer consciousness stay vital defenses in opposition to refined network-based assaults leveraging such vulnerabilities.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:0Day, Code, Enables, Engine, Execution, Microsoft, Network, Remote, Scripting, Vulnerability

Post navigation

Previous Post: Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild
Next Post: Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges

Related Posts

Farmers Insurance Cyber Attack – 1.1 Million Customers Data Exposed in Salesforce Attack Cyber Security News
New North Korean IT Worker With Innocent Job Application Get Access to Organization’s Network Cyber Security News
PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request Cyber Security News
New ClickFake Interview Attack Using ClickFix Technique to Deliver GolangGhost Malware Cyber Security News
PhpSpreadsheet Library Vulnerability Enables Attackers to Feed Malicious HTML Input Cyber Security News
15 Best Bandwidth Monitoring Tools in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News