Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

Posted on November 15, 2025November 15, 2025 By CWS

Nov 15, 2025Ravie LakshmananMalware / Vulnerability
The botnet malware often known as RondoDox has been noticed concentrating on unpatched XWiki situations towards a vital safety flaw that might enable attackers to attain arbitrary code execution.
The vulnerability in query is CVE-2025-24893 (CVSS rating: 9.8), an eval injection bug that might enable any visitor person to carry out arbitrary distant code execution by a request to the “/bin/get/Principal/SolrSearch” endpoint. It was patched by the maintainers in XWiki 15.10.11, 16.4.1, and 16.5.0RC1 in late February 2025.
Whereas there was proof that the shortcoming had been exploited within the wild since not less than March, it wasn’t till late October, when VulnCheck disclosed it had noticed recent makes an attempt weaponizing the flaw as a part of a two-stage assault chain to deploy a cryptocurrency miner.

Subsequently, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) added the vulnerability to its Identified Exploited Vulnerabilities (KEV) catalog, requiring federal companies to use obligatory mitigations by November 20.
In a recent report printed Friday, VulnCheck revealed that it has since noticed a spike in exploitation makes an attempt, hitting a brand new excessive on November 7, adopted by one other surge on November 11. This means broader scanning exercise seemingly pushed by a number of menace actors collaborating within the effort.
This consists of RondoDox, a botnet that is quickly including new exploitation vectors to rope prone gadgets right into a botnet for conducting distributed denial-of-service (DDoS) assaults utilizing HTTP, UDP, and TCP protocols. The primary RondoDox exploit was noticed on November 3, 2025, per the cybersecurity firm.
Different assaults have been noticed exploiting the flaw to ship cryptocurrency miners, in addition to makes an attempt to ascertain a reverse shell and common probing exercise utilizing a Nuclei template for CVE-2025-24893.
The findings as soon as once more illustrate the necessity for adopting strong patch administration practices to make sure optimum safety.
“CVE-2025-24893 is a well-known story: one attacker strikes first, and plenty of comply with,” VulnCheck’s Jacob Baines mentioned. “Inside days of the preliminary exploitation, we noticed botnets, miners, and opportunistic scanners all adopting the identical vulnerability.”

The Hacker News Tags:Botnet, Devices, Exploits, Pull, RondoDox, Servers, Unpatched, XWiki

Post navigation

Previous Post: Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges
Next Post: Network Communication Blocker Tool That Neutralizes EDR/AV

Related Posts

Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud The Hacker News
Google Introduces 24-Hour Delay for Unverified App Installs Google Introduces 24-Hour Delay for Unverified App Installs The Hacker News
Assessing the Role of AI in Zero Trust Assessing the Role of AI in Zero Trust The Hacker News
LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem The Hacker News
WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware The Hacker News
China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark