Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Organizations Warned of Exploited Adobe AEM Forms Vulnerability

Posted on October 16, 2025October 16, 2025 By CWS

The US cybersecurity company CISA on Wednesday warned {that a} latest Adobe Expertise Supervisor Types (AEM Types) vulnerability has been exploited in assaults.

Tracked as CVE-2025-54253 (CVSS rating of 10.0), the flaw was patched in early August with an out-of-band replace, as a proof-of-concept (PoC) exploit had already been public.

AEM Types is an answer designed for creating, managing, and publishing digital varieties and paperwork. Described as a misconfiguration concern, the safety defect might be exploited for arbitrary code execution.

Shubham Shah and Adam Kues of Searchlight Cyber, who found the safety gap, mentioned it was a mixture of authentication bypass and the Struts improvement mode for the admin UI being left enabled.

An attacker may craft a payload to execute Object-Graph Navigation Language (OGNL) expressions and will use public sandbox bypasses to attain distant code execution, the researchers mentioned.

Adobe addressed the vulnerability in AEM Types on Java Enterprise Version (JEE) model 6.5.0-0108, which additionally addressed CVE-2025-54254 (CVSS rating of 8.6), an improper restriction of XML Exterior Entity reference concern resulting in arbitrary file system learn.

“Adobe is conscious that CVE-2025-54253 and CVE-2025-54254 have a publicly out there proof-of-concept,” the corporate warned in August, urging prospects to replace their deployments as quickly as doable.

On Wednesday, CISA added CVE-2025-54253 to its Recognized Exploited Vulnerabilities (KEV) catalog, warning of its in-the-wild exploitation, with out offering info on the noticed assaults.Commercial. Scroll to proceed studying.

As mandated by Binding Operational Directive (BOD) 22-01, federal businesses got three weeks to establish susceptible AEM Types installations of their environments and apply the out there patches.

Whereas BOD 22-01 solely applies to federal businesses, CISA recommends that each one organizations apply patches for the vulnerabilities described within the KEV record.

This week, Adobe launched patches for over 35 safety defects in its merchandise, together with a critical-severity concern within the Join collaboration suite.

Associated: Adobe Patches Important ColdFusion and Commerce Vulnerabilities

Associated: Microsoft Patches 173 Vulnerabilities, Together with Exploited Home windows Flaws

Associated: ICS Patch Tuesday: Fixes Introduced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact

Associated: Fortra GoAnywhere MFT Zero-Day Exploited in Ransomware Assaults

Security Week News Tags:Adobe, AEM, Exploited, Forms, Organizations, Vulnerability, Warned

Post navigation

Previous Post: PhantomVAI Loader Attacking Organizations Worldwide to Deliver AsyncRAT, XWorm, FormBook and DCRat
Next Post: Matters.AI Raises $6.25 Million to Safeguard Enterprise Data

Related Posts

Scattered Spider Activity Drops Following Arrests, but Others Adopting Group’s Tactics Security Week News
Tiffany Data Breach Impacts Thousands of Customers Security Week News
In Other News: Scammers Abuse Grok, US Manufacturing Attacks, Gmail Security Claims Debunked Security Week News
Flaws in Major Automaker’s Dealership Systems Allowed Car Hacking, Personal Data Theft Security Week News
Apple, Netflix, Microsoft Sites ‘Hacked’ for Tech Support Scams  Security Week News
Fortinet, Ivanti Release August 2025 Security Patches Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging
  • North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
  • Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
  • Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign
  • Operation Silk Lure Weaponizing Windows Scheduled Tasks to Drop ValleyRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging
  • North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
  • Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
  • Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign
  • Operation Silk Lure Weaponizing Windows Scheduled Tasks to Drop ValleyRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News