#CVE2025

2025-12-09

Cal.com has patched a critical authentication bypass (CVE-2025-66489) that allowed attackers to submit any non-empty TOTP field and skip password checks. Versions ≤5.9.7 were impacted.

Update to 5.9.8 to ensure both password and TOTP verification are enforced.
How should MFA implementations be validated to prevent logic gaps like this?

Source: gbhackers.com/critical-cal-com

Share your insights and follow us for more security reporting.

#infosec #appsec #CVE2025 #authentication #MFA #ThreatIntel #SecureCoding #SoftwareSecurity #VulnerabilityManagement #SecurityUpdate

Critical Cal.com Flaw Allows Attackers to Bypass Authentication Using Fake TOTP Codes
Offensive Sequenceoffseq@infosec.exchange
2025-12-03

🛡️ CVE-2025-13646: HIGH severity in wpchill Image Gallery for WordPress (v2.13.1). Authenticated Author+ users can upload dangerous files, risking RCE. Restrict roles, monitor uploads, and patch ASAP. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #CVE2025 #Cybersecurity

High threat: CVE-2025-13646: CWE-434 Unrestricted Upload of File with Dangerous Type in wpchill Image Gallery – P
Offensive Sequenceoffseq@infosec.exchange
2025-12-03

⚠️ CRITICAL: CVE-2025-13658 hits Industrial Video & Control Longwatch v6.309 — remote unauthenticated code execution via HTTP GET grants SYSTEM privileges. No patch yet. Segment, restrict access, monitor traffic. Full advisory: radar.offseq.com/threat/cve-20 #OffSeq #OTSecurity #CVE2025

Critical threat: CVE-2025-13658: CWE-94 Improper Control of Generation of Code ('Code Injection') in Industrial Video
2025-11-26

ASUS has patched a high-severity local privilege escalation flaw (CVE-2025-59373) in MyASUS that allowed elevation to NT AUTHORITY/SYSTEM via the System Control Interface Service. Patch now shipped through Windows Update with updated versions for x64 and ARM.

Full details:
technadu.com/asus-fixes-high-s

#infosec #vulnerability #ASUS #WindowsSecurity #patchmanagement #CVE2025

ASUS Fixes High-Severity MyASUS Vulnerability that Allows Privilege Escalation to SYSTEM-Level Access
Offensive Sequenceoffseq@infosec.exchange
2025-11-26

🚨 CVE-2025-13597 (CRITICAL): soportecibeles AI Feeds ≤1.0.11 for WordPress allows unauthenticated file uploads via 'actualizador_git.php', enabling RCE. Restrict access & monitor file integrity while awaiting patch. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE2025

Critical threat: CVE-2025-13597: CWE-434 Unrestricted Upload of File with Dangerous Type in soportecibeles AI Feeds
2025-11-24

Threat actors are actively exploiting CVE-2025-59287 in WSUS to deploy ShadowPad.

ASEC notes the attackers used PowerCat for shell access, then fetched and installed ShadowPad with certutil/curl, executing it through DLL side-loading.

How are you securing WSUS or other update infrastructure in your environment?
💬 Share your insights
⭐ Follow TechNadu for timely threat intel

#infosec #WSUS #ShadowPad #CVE2025 #malware #threatintel #sysadmin #DFIR #TechNadu

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access
Offensive Sequenceoffseq@infosec.exchange
2025-11-24

🔥 CVE-2025-13551 (HIGH): Buffer overflow in D-Link DIR-822K/DWR-M920 (firmware 1.00_20250513164613, 1.1.50). Remote, unauthenticated RCE possible; public exploit out. Isolate & monitor now! More: radar.offseq.com/threat/cve-20 #OffSeq #DLink #CVE2025 #RouterSecurity

High threat: CVE-2025-13551: Buffer Overflow in D-Link DIR-822K
Offensive Sequenceoffseq@infosec.exchange
2025-11-21

🚨 CVE-2025-64762 (HIGH): workos authkit-nextjs <2.11.1 fails to set anti-caching headers, risking session token leaks via CDN caches. Upgrade to 2.11.1+ or review CDN cache configs now! radar.offseq.com/threat/cve-20 #OffSeq #Nextjs #Security #CVE2025

High threat: CVE-2025-64762: CWE-524: Use of Cache Containing Sensitive Information in workos authkit-nextjs
Offensive Sequenceoffseq@infosec.exchange
2025-11-21

🚨 CRITICAL: CVE-2025-64310 in EPSON WebConfig for Projectors enables unlimited login attempts, risking brute force admin password attacks. Check vendor for affected versions & mitigation steps. radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #Vuln #InfoSec

Critical threat: CVE-2025-64310: Improper restriction of excessive authentication attempts in SEIKO EPSON CORPORATION
Offensive Sequenceoffseq@infosec.exchange
2025-11-19

🚨 CVE-2025-13035: HIGH severity PHP code injection in Code Snippets plugin (≤3.9.1) for WordPress. Attackers with Contributor+ access & admin action can run arbitrary code. Disable file-based execution & restrict access. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE2025 #Security

High threat: CVE-2025-13035: CWE-94 Improper Control of Generation of Code ('Code Injection') in codesnippetspro
Offensive Sequenceoffseq@infosec.exchange
2025-11-17

🛡️ CVE-2025-13258: HIGH severity buffer overflow in Tenda AC20 routers (≤16.03.08.12) via /goform/WifiExtraSet. Public exploit out—remotely exploitable, no auth needed. Restrict access, monitor, and patch ASAP. radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #Tenda #BufferOverflow

High threat: CVE-2025-13258: Buffer Overflow in Tenda AC20
Offensive Sequenceoffseq@infosec.exchange
2025-11-10

🔒 CRITICAL: CVE-2025-12866 in Hundred Plus EIP Plus — weak forgot password allows remote reset of any account! All versions vulnerable. Disable recovery, enforce MFA, monitor resets. More info: radar.offseq.com/threat/cve-20 #OffSeq #CVE2025 #Infosec #Vuln

Critical threat: CVE-2025-12866: CWE-640 Weak Password Recovery Mechanism for Forgotten Password in Hundred Plus EIP
Offensive Sequenceoffseq@infosec.exchange
2025-11-10

⚠️ CVE-2025-12865: HIGH severity SQL Injection in e-Excellence U-Office Force allows authenticated attackers to manipulate DB data. No patch yet — validate inputs, use WAFs, restrict DB rights. Details: radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #CVE2025 #InfoSec

High threat: CVE-2025-12865: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Inje
Offensive Sequenceoffseq@infosec.exchange
2025-11-04

🚨 CVE-2025-12158 (CRITICAL): Simple User Capabilities plugin for WordPress lets unauthenticated attackers grant admin rights via missing auth in suc_submit_capabilities(). Disable plugin ASAP. No patch yet! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE2025 #infosec

Critical threat: CVE-2025-12158: CWE-862 Missing Authorization in tanvirahmed1984 Simple User Capabilities
Offensive Sequenceoffseq@infosec.exchange
2025-11-02

⚠️ CVE-2025-12601 (CRITICAL, CVSS 10): Azure Access Tech BLU-IC2/IC4 (≤1.19.5) vulnerable to SlowLoris DoS. No patch—use WAF/IPS, tighten timeouts, monitor for anomalies. Protect critical services! radar.offseq.com/threat/cve-20 #OffSeq #Azure #DoSVuln #CVE2025

Critical threat: CVE-2025-12601: CWE-730 Denial of Service in Azure Access Technology BLU-IC2
Offensive Sequenceoffseq@infosec.exchange
2025-10-31

🚨 CRITICAL: CVE-2025-8489 in King Addons for Elementor (WordPress). All versions let unauth attackers create admin accounts due to improper privilege controls (CWE-269). Disable plugin, monitor registrations, and enforce MFA. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec #CVE2025

Critical threat: CVE-2025-8489: CWE-269 Improper Privilege Management in kingaddons King Addons for Elementor – 4,000
Offensive Sequenceoffseq@infosec.exchange
2025-10-31

🔥 CVE-2025-48983 (CRITICAL, CVSS 10): Veeam Backup & Replication 12.3.2 is vulnerable to authenticated RCE via the Mount service. Patch as soon as available, restrict domain access, and monitor backup hosts! radar.offseq.com/threat/cve-20 #OffSeq #Veeam #CVE2025 #RCE

Critical threat: CVE-2025-48983: Vulnerability in Veeam Backup and Replication
Offensive Sequenceoffseq@infosec.exchange
2025-10-30

🛡️ CRITICAL: CVE-2025-12478 affects Azure Access BLU-IC2 & BLU-IC4 (≤1.19.5) via weak TLS (CWE-326). Exploitable remotely, risking data & service integrity. Harden configs, monitor traffic, and prep for patches. More: radar.offseq.com/threat/cve-20 #OffSeq #Azure #CVE2025 #TLS

Critical threat: CVE-2025-12478: CWE-326 Inadequate Encryption Strength in Azure Access Technology BLU-IC2
Offensive Sequenceoffseq@infosec.exchange
2025-10-29

🚨 CRITICAL: CVE-2025-12423 (CVSS 10) in Azure BLU-IC2 & IC4 (≤1.19.5) allows remote DoS via protocol manipulation (CWE-248). No patch yet—apply filtering, segment networks, and monitor logs. Stay proactive! radar.offseq.com/threat/cve-20 #OffSeq #AzureSecurity #CVE2025 #BlueTeam

Critical threat: CVE-2025-12423: CWE-248 Uncaught Exception in Azure Access Technology BLU-IC2

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst