Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gaps

Posted on June 10, 2025June 10, 2025 By CWS

Jun 10, 2025Ravie LakshmananVulnerability / Cloud Safety
Adobe on Tuesday pushed safety updates to handle a complete of 254 safety flaws impacting its software program merchandise, a majority of which have an effect on Expertise Supervisor (AEM).
Of the 254 flaws, 225 reside in AEM, impacting AEM Cloud Service (CS) in addition to all variations previous to and together with 6.5.22. The problems have been resolved in AEM Cloud Service Launch 2025.5 and model 6.5.23.
“Profitable exploitation of those vulnerabilities may end in arbitrary code execution, privilege escalation, and safety function bypass,” Adobe mentioned in an advisory.
Virtually all of the 225 vulnerabilities have been labeled as cross-site scripting (XSS) vulnerabilities, particularly a mixture of saved XSS and DOM-based XSS, that could possibly be exploited to attain arbitrary code execution.
Adobe has credited safety researchers Jim Inexperienced (green-jam), Akshay Sharma (anonymous_blackzero), and lpi for locating and reporting the XSS flaws.
Probably the most extreme of the failings patched by the corporate as a part of this month’s replace considerations a code execution flaw in Adobe Commerce and Magento Open Supply.

The critical-rated vulnerability, CVE-2025-47110 (CVSS rating: 9.1) is a mirrored XSS vulnerability that might end in arbitrary code execution. Additionally addressed is an improper authorization flaw (CVE-2025-43585, CVSS rating: 8.2) that might result in a safety function bypass.
The next variations are impacted –

Adobe Commerce (2.4.8, 2.4.7-p5 and earlier, 2.4.6-p10 and earlier, 2.4.5-p12 and earlier, and a couple of.4.4-p13 and earlier)
Adobe Commerce B2B (1.5.2 and earlier, 1.4.2-p5 and earlier, 1.3.5-p10 and earlier, 1.3.4-p12 and earlier, and 1.3.3-p13 and earlier)
Magento Open Supply (2.4.8, 2.4.7-p5 and earlier, 2.4.6-p10 and earlier, 2.4.5-p12 and earlier)

Of the remaining updates, 4 relate to code execution flaws in Adobe InCopy (CVE-2025-30327, CVE-2025-47107, CVSS scores: 7.8) and Substance 3D Sampler (CVE-2025-43581, CVE-2025-43588, CVSS scores: 7.8).
Whereas not one of the bugs have been listed as publicly identified or exploited within the wild, customers are suggested to replace their situations to the newest model to safeguard in opposition to potential threats.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Adobe, Closing, Fixing, Gaps, HighSeverity, Patch, Releases, Security, Vulnerabilities

Post navigation

Previous Post: Microsoft Patch Tuesday Covers WebDAV Flaw Marked as ‘Already Exploited’
Next Post: APT Hackers Exploited Windows WebDAV 0-Day RCE Vulnerability in the Wild to Deploy Malware

Related Posts

Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages The Hacker News
OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities The Hacker News
Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms The Hacker News
Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware The Hacker News
New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit The Hacker News
Wormable AirPlay Flaws Enable Zero-Click RCE on Apple Devices via Public Wi-Fi The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News