Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Organizations Warned of Exploited Adobe AEM Forms Vulnerability

Organizations Warned of Exploited Adobe AEM Forms Vulnerability

Posted on October 16, 2025October 16, 2025 By CWS

The US cybersecurity company CISA on Wednesday warned {that a} latest Adobe Expertise Supervisor Types (AEM Types) vulnerability has been exploited in assaults.

Tracked as CVE-2025-54253 (CVSS rating of 10.0), the flaw was patched in early August with an out-of-band replace, as a proof-of-concept (PoC) exploit had already been public.

AEM Types is an answer designed for creating, managing, and publishing digital varieties and paperwork. Described as a misconfiguration concern, the safety defect might be exploited for arbitrary code execution.

Shubham Shah and Adam Kues of Searchlight Cyber, who found the safety gap, mentioned it was a mixture of authentication bypass and the Struts improvement mode for the admin UI being left enabled.

An attacker may craft a payload to execute Object-Graph Navigation Language (OGNL) expressions and will use public sandbox bypasses to attain distant code execution, the researchers mentioned.

Adobe addressed the vulnerability in AEM Types on Java Enterprise Version (JEE) model 6.5.0-0108, which additionally addressed CVE-2025-54254 (CVSS rating of 8.6), an improper restriction of XML Exterior Entity reference concern resulting in arbitrary file system learn.

“Adobe is conscious that CVE-2025-54253 and CVE-2025-54254 have a publicly out there proof-of-concept,” the corporate warned in August, urging prospects to replace their deployments as quickly as doable.

On Wednesday, CISA added CVE-2025-54253 to its Recognized Exploited Vulnerabilities (KEV) catalog, warning of its in-the-wild exploitation, with out offering info on the noticed assaults.Commercial. Scroll to proceed studying.

As mandated by Binding Operational Directive (BOD) 22-01, federal businesses got three weeks to establish susceptible AEM Types installations of their environments and apply the out there patches.

Whereas BOD 22-01 solely applies to federal businesses, CISA recommends that each one organizations apply patches for the vulnerabilities described within the KEV record.

This week, Adobe launched patches for over 35 safety defects in its merchandise, together with a critical-severity concern within the Join collaboration suite.

Associated: Adobe Patches Important ColdFusion and Commerce Vulnerabilities

Associated: Microsoft Patches 173 Vulnerabilities, Together with Exploited Home windows Flaws

Associated: ICS Patch Tuesday: Fixes Introduced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact

Associated: Fortra GoAnywhere MFT Zero-Day Exploited in Ransomware Assaults

Security Week News Tags:Adobe, AEM, Exploited, Forms, Organizations, Vulnerability, Warned

Post navigation

Previous Post: PhantomVAI Loader Attacking Organizations Worldwide to Deliver AsyncRAT, XWorm, FormBook and DCRat
Next Post: Matters.AI Raises $6.25 Million to Safeguard Enterprise Data

Related Posts

Webinar Today: AI and the Trust Dilemma: Balancing Innovation and Risk Webinar Today: AI and the Trust Dilemma: Balancing Innovation and Risk Security Week News
In Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice In Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice Security Week News
Hackers Inject Malware Into Gravity Forms WordPress Plugin  Hackers Inject Malware Into Gravity Forms WordPress Plugin  Security Week News
Senate Approves Joshua Rudd for NSA and Cyber Command Senate Approves Joshua Rudd for NSA and Cyber Command Security Week News
Organizations Warned of Exploited Linux Vulnerabilities Organizations Warned of Exploited Linux Vulnerabilities Security Week News
Honoring Our Veteran Readers: Thank You for Your Service Honoring Our Veteran Readers: Thank You for Your Service Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark