Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence

CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence

Posted on November 5, 2025November 5, 2025 By CWS

Nov 05, 2025Ravie LakshmananVulnerability / Community Safety
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Tuesday added two safety flaws impacting Gladinet and Management Net Panel (CWP) to its Recognized Exploited Vulnerabilities (KEV) catalog, citing proof of energetic exploitation within the wild.
The vulnerabilities in query are listed under –

CVE-2025-11371 (CVSS rating: 7.5) – A vulnerability in recordsdata or directories accessible to exterior events in Gladinet CentreStack and Triofox that might end in unintended disclosure of system recordsdata.
CVE-2025-48703 (CVSS rating: 9.0) – An working system command injection vulnerability in Management Net Panel (previously CentOS Net Panel) that leads to unauthenticated distant code execution by way of shell metacharacters within the t_total parameter in a filemanager changePerm request.

The event comes weeks after cybersecurity firm Huntress mentioned it detected energetic exploitation makes an attempt focusing on CVE-2025-11371, with unknown menace actors leveraging the flaw to run reconnaissance instructions (e.g., ipconfig /all) handed within the type of a Base64-encoded payload.

Nonetheless, there are at present no public reviews on how CVE-2025-48703 is being weaponized in real-world assaults. Nonetheless, technical particulars of the flaw had been shared by safety researcher Maxime Rinaudo in June 2025, shortly after it was patched in model 0.9.8.1205 following accountable disclosure on Could 13.
“It permits a distant attacker who is aware of a legitimate username on a CWP occasion to execute pre-authenticated arbitrary instructions on the server,” Rinaudo mentioned.
In mild of energetic exploitation, Federal Civilian Govt Department (FCEB) companies are required to use the mandatory fixes by November 25, 2025, to safe their networks.

The addition of the 2 flaws to the KEV catalog follows reviews from Wordfence in regards to the exploitation of crucial safety vulnerabilities impacting three WordPress plugins and themes –

CVE-2025-11533 (CVSS rating: 9.8) – A privilege escalation vulnerability in WP Freeio that makes it attainable for an unauthenticated attacker to grant themselves administrative privileges by specifying a person position throughout registration.
CVE-2025-5397 (CVSS rating: 9.8) – An authentication bypass vulnerability in Noo JobMonster that makes it attainable for unauthenticated attackers to sidestep customary authentication and entry administrative person accounts, assuming social login is enabled on a web site.
CVE-2025-11833 (CVSS rating: 9.8) – An absence of authorization checks in Publish SMTP that makes it attainable for an unauthenticated attacker to view electronic mail logs, together with password reset emails, and alter the password of any person, together with an administrator, permitting web site takeover.

WordPress web site customers counting on the aforementioned plugins and themes are really useful to replace them to the newest model as quickly as attainable, use sturdy passwords, and audit the websites for indicators of malware or the presence of sudden accounts.

The Hacker News Tags:Active, Adds, Catalog, CISA, CWP, Evidence, Exploitation, Flaws, Gladinet, KEV

Post navigation

Previous Post: HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface
Next Post: CISA Warns of CWP Vulnerability Exploited in the Wild

Related Posts

Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices The Hacker News
Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid The Hacker News
Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass The Hacker News
Securing Data in the AI Era Securing Data in the AI Era The Hacker News
CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild The Hacker News
VPN 0-Day, Encryption Backdoor, AI Malware, macOS Flaw, ATM Hack & More VPN 0-Day, Encryption Backdoor, AI Malware, macOS Flaw, ATM Hack & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News