Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

Posted on November 15, 2025November 15, 2025 By CWS

Nov 15, 2025Ravie LakshmananMalware / Vulnerability
The botnet malware often known as RondoDox has been noticed concentrating on unpatched XWiki situations towards a vital safety flaw that might enable attackers to attain arbitrary code execution.
The vulnerability in query is CVE-2025-24893 (CVSS rating: 9.8), an eval injection bug that might enable any visitor person to carry out arbitrary distant code execution by a request to the “/bin/get/Principal/SolrSearch” endpoint. It was patched by the maintainers in XWiki 15.10.11, 16.4.1, and 16.5.0RC1 in late February 2025.
Whereas there was proof that the shortcoming had been exploited within the wild since not less than March, it wasn’t till late October, when VulnCheck disclosed it had noticed recent makes an attempt weaponizing the flaw as a part of a two-stage assault chain to deploy a cryptocurrency miner.

Subsequently, the U.S. Cybersecurity and Infrastructure Safety Company (CISA) added the vulnerability to its Identified Exploited Vulnerabilities (KEV) catalog, requiring federal companies to use obligatory mitigations by November 20.
In a recent report printed Friday, VulnCheck revealed that it has since noticed a spike in exploitation makes an attempt, hitting a brand new excessive on November 7, adopted by one other surge on November 11. This means broader scanning exercise seemingly pushed by a number of menace actors collaborating within the effort.
This consists of RondoDox, a botnet that is quickly including new exploitation vectors to rope prone gadgets right into a botnet for conducting distributed denial-of-service (DDoS) assaults utilizing HTTP, UDP, and TCP protocols. The primary RondoDox exploit was noticed on November 3, 2025, per the cybersecurity firm.
Different assaults have been noticed exploiting the flaw to ship cryptocurrency miners, in addition to makes an attempt to ascertain a reverse shell and common probing exercise utilizing a Nuclei template for CVE-2025-24893.
The findings as soon as once more illustrate the necessity for adopting strong patch administration practices to make sure optimum safety.
“CVE-2025-24893 is a well-known story: one attacker strikes first, and plenty of comply with,” VulnCheck’s Jacob Baines mentioned. “Inside days of the preliminary exploitation, we noticed botnets, miners, and opportunistic scanners all adopting the identical vulnerability.”

The Hacker News Tags:Botnet, Devices, Exploits, Pull, RondoDox, Servers, Unpatched, XWiki

Post navigation

Previous Post: Cisco Catalyst Center Vulnerability Let Attackers Escalate Priveleges
Next Post: Network Communication Blocker Tool That Neutralizes EDR/AV

Related Posts

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale The Hacker News
Feds Seize .4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain The Hacker News
Why 2026 Will be the Year of Machine-Speed Security Why 2026 Will be the Year of Machine-Speed Security The Hacker News
Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on Dissidents Iran-Linked DCHSpy Android Malware Masquerades as VPN Apps to Spy on Dissidents The Hacker News
APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs The Hacker News
Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News