#CVE2025

Hacker Newsh4ckernews
2025-12-25

All I Want for Xmas Is Your Secrets: LangGrinch Hits LangChain (CVE-2025-68664)

cyata.ai/blog/langgrinch-langc

2025-12-23

Critical n8n flaw (CVE-2025-68613, CVSS 9.9) allows RCE via expression injection. Affected versions: >=0.211.0 <1.120.4. Update now! #n8n #CVE2025 #RCE #Security #AnhNguồn #CôngNghệ

reddit.com/r/selfhosted/commen

Offensive Sequenceoffseq@infosec.exchange
2025-12-23

🚨 CVE-2025-14388: CRITICAL vuln in PhastPress (≤3.7) lets unauth attackers read files like wp-config.php using double-encoded null bytes. Patch unavailable—disable plugin, block %2500 in URLs, monitor logs! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vulnerability #CVE2025

Critical threat: CVE-2025-14388: CWE-158 Improper Neutralization of Null Byte or NUL Character in kiboit PhastPress
Offensive Sequenceoffseq@infosec.exchange
2025-12-22

🔎 CVE-2025-11544 (CRITICAL, CVSS 9.5): Sharp Display Solutions projectors let attackers upload unauthorized firmware—remote, no auth needed. All models vulnerable. Urgently segment, restrict, and monitor! radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #infosec #embeddedsecurity

Critical threat: CVE-2025-11544: CWE-912: Hidden Functionality in Sharp Display Solutions, Ltd. NP-P627UL, NP-P627ULG
Offensive Sequenceoffseq@infosec.exchange
2025-12-22

🔴 CVE-2025-11545: CRITICAL vuln in all Sharp projectors—embedded HTTP server leaks sensitive info, enables unauth’d remote actions. Network access only! Segment, restrict HTTP, monitor for abuse. Patch ASAP when available. radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #IoTSecurity

Critical threat: CVE-2025-11545: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere
Offensive Sequenceoffseq@infosec.exchange
2025-12-22

🚨 CVE-2025-15016: CRITICAL flaw in Ragic Enterprise Cloud Database. Hard-coded crypto key enables remote, unauthenticated access as any user. Audit & restrict access urgently. No patch yet—mitigate now! radar.offseq.com/threat/cve-20 #OffSeq #CloudSecurity #Vulnerability #CVE2025

Critical threat: CVE-2025-15016: CWE-321 Use of Hard-coded Cryptographic Key in Ragic Enterprise Cloud Database
Offensive Sequenceoffseq@infosec.exchange
2025-12-19

🚨 CVE-2025-68398: CRITICAL vuln in Weblate (<5.15.1). Privileged users can overwrite Git configs, risking full system compromise. Patch to 5.15.1+ & audit Git settings now! radar.offseq.com/threat/cve-20 #OffSeq #Weblate #Infosec #CVE2025

Critical threat: CVE-2025-68398: CWE-20: Improper Input Validation in WeblateOrg weblate
Offensive Sequenceoffseq@infosec.exchange
2025-12-18

⚠️ CRITICAL: CVE-2025-47372 impacts Qualcomm Snapdragon (many models). Classic buffer overflow via oversized ELF files causes memory corruption—no auth required. Security teams: review exposure & monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Snapdragon #CVE2025

Critical threat: CVE-2025-47372: CWE-120 Buffer Copy Without Checking Size of Input ('Classic Buffer Overflow') in Qu
Offensive Sequenceoffseq@infosec.exchange
2025-12-17

⚠️ HIGH severity: CVE-2025-11924 impacts Ninja Forms (WordPress), letting unauthenticated attackers access form data via REST API. Patch 3.13.1 is ineffective. Restrict API, audit tokens, and monitor logs. More info: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE2025 #Security

High threat: CVE-2025-11924: CWE-639 Authorization Bypass Through User-Controlled Key in kstover Ninja Forms – Th
Offensive Sequenceoffseq@infosec.exchange
2025-12-10

🚨 CRITICAL: CVE-2025-13955 in EZCast Pro II v1.17478.146 — Predictable default Wi-Fi password lets attackers nearby calculate access credentials. Review your AP configs & restrict access. More info: radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #IoTSecurity #Infosec

Critical threat: CVE-2025-13955: CWE-330 Use of Insufficiently Random Values in EZCast EZCast Pro II
2025-12-09

Cal.com has patched a critical authentication bypass (CVE-2025-66489) that allowed attackers to submit any non-empty TOTP field and skip password checks. Versions ≤5.9.7 were impacted.

Update to 5.9.8 to ensure both password and TOTP verification are enforced.
How should MFA implementations be validated to prevent logic gaps like this?

Source: gbhackers.com/critical-cal-com

Share your insights and follow us for more security reporting.

#infosec #appsec #CVE2025 #authentication #MFA #ThreatIntel #SecureCoding #SoftwareSecurity #VulnerabilityManagement #SecurityUpdate

Critical Cal.com Flaw Allows Attackers to Bypass Authentication Using Fake TOTP Codes
Offensive Sequenceoffseq@infosec.exchange
2025-12-03

🛡️ CVE-2025-13646: HIGH severity in wpchill Image Gallery for WordPress (v2.13.1). Authenticated Author+ users can upload dangerous files, risking RCE. Restrict roles, monitor uploads, and patch ASAP. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #CVE2025 #Cybersecurity

High threat: CVE-2025-13646: CWE-434 Unrestricted Upload of File with Dangerous Type in wpchill Image Gallery – P
Offensive Sequenceoffseq@infosec.exchange
2025-12-03

⚠️ CRITICAL: CVE-2025-13658 hits Industrial Video & Control Longwatch v6.309 — remote unauthenticated code execution via HTTP GET grants SYSTEM privileges. No patch yet. Segment, restrict access, monitor traffic. Full advisory: radar.offseq.com/threat/cve-20 #OffSeq #OTSecurity #CVE2025

Critical threat: CVE-2025-13658: CWE-94 Improper Control of Generation of Code ('Code Injection') in Industrial Video
2025-11-26

ASUS has patched a high-severity local privilege escalation flaw (CVE-2025-59373) in MyASUS that allowed elevation to NT AUTHORITY/SYSTEM via the System Control Interface Service. Patch now shipped through Windows Update with updated versions for x64 and ARM.

Full details:
technadu.com/asus-fixes-high-s

#infosec #vulnerability #ASUS #WindowsSecurity #patchmanagement #CVE2025

ASUS Fixes High-Severity MyASUS Vulnerability that Allows Privilege Escalation to SYSTEM-Level Access
Offensive Sequenceoffseq@infosec.exchange
2025-11-26

🚨 CVE-2025-13597 (CRITICAL): soportecibeles AI Feeds ≤1.0.11 for WordPress allows unauthenticated file uploads via 'actualizador_git.php', enabling RCE. Restrict access & monitor file integrity while awaiting patch. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE2025

Critical threat: CVE-2025-13597: CWE-434 Unrestricted Upload of File with Dangerous Type in soportecibeles AI Feeds
2025-11-24

Threat actors are actively exploiting CVE-2025-59287 in WSUS to deploy ShadowPad.

ASEC notes the attackers used PowerCat for shell access, then fetched and installed ShadowPad with certutil/curl, executing it through DLL side-loading.

How are you securing WSUS or other update infrastructure in your environment?
💬 Share your insights
⭐ Follow TechNadu for timely threat intel

#infosec #WSUS #ShadowPad #CVE2025 #malware #threatintel #sysadmin #DFIR #TechNadu

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access
Offensive Sequenceoffseq@infosec.exchange
2025-11-24

🔥 CVE-2025-13551 (HIGH): Buffer overflow in D-Link DIR-822K/DWR-M920 (firmware 1.00_20250513164613, 1.1.50). Remote, unauthenticated RCE possible; public exploit out. Isolate & monitor now! More: radar.offseq.com/threat/cve-20 #OffSeq #DLink #CVE2025 #RouterSecurity

High threat: CVE-2025-13551: Buffer Overflow in D-Link DIR-822K
Offensive Sequenceoffseq@infosec.exchange
2025-11-21

🚨 CVE-2025-64762 (HIGH): workos authkit-nextjs <2.11.1 fails to set anti-caching headers, risking session token leaks via CDN caches. Upgrade to 2.11.1+ or review CDN cache configs now! radar.offseq.com/threat/cve-20 #OffSeq #Nextjs #Security #CVE2025

High threat: CVE-2025-64762: CWE-524: Use of Cache Containing Sensitive Information in workos authkit-nextjs
Offensive Sequenceoffseq@infosec.exchange
2025-11-21

🚨 CRITICAL: CVE-2025-64310 in EPSON WebConfig for Projectors enables unlimited login attempts, risking brute force admin password attacks. Check vendor for affected versions & mitigation steps. radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #Vuln #InfoSec

Critical threat: CVE-2025-64310: Improper restriction of excessive authentication attempts in SEIKO EPSON CORPORATION

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst