17 min read
Stay ahead of the game
Loading

click here to copy URL

Key Findings:

Top Reported Known Exploitable Issues:

CVE-2025-14847 | MongoBleed

Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Server v4.4 versions prior to 4.4.30, MongoDB Server v4.2 versions greater than or equal to 4.2.0, MongoDB Server v4.0 versions greater than or equal to 4.0.0, and MongoDB Server v3.6 versions greater than or equal to 3.6.0. Exploit and technical details for CVE-2025-14847 are publicly available.

CVE-2025-46295 | FileMaker Server

Claris has released a security update for FileMaker Server to address a critical severity vulnerability in the Apache Commons Text library used by the software. An attacker could exploit this vulnerability to achieve remote code execution (RCE). CVE-2025-46295 – Improper control of generation of code (‘code injection’) – CVSSv3 score: 9.8

CVE-2026-20805 | Microsoft

Desktop Window Manager Information Disclosure Vulnerability. Exposure of sensitive information to an unauthorized actor in Desktop Windows Manager allows an authorized attacker to disclose information locally. This is included in Patch Tuesday 13/1/26 and has also been added to the CISA KEV.

CVE-2025-69258 | Trend Micro

Trend Micro has released security updates to address multiple security vulnerabilities impacting on-premise versions of Apex Central for Windows, including a critical bug that could result in arbitrary code execution. The vulnerability, tracked as CVE-2025-69258, carries a CVSS score of 9.8 out of a maximum of 10.0. The vulnerability has been described as a case of remote code execution affecting LoadLibraryEX. “A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthenticated remote attacker to load an attacker-controlled DLL into a key executable, leading to execution of attacker-supplied code under the context of SYSTEM on affected installations,”

CVE-2025-14733 | WatchGuard Firebox

CVE-2025-14733 Under Exploitation WatchGuard has reported that CVE-2025-14733 in the Fireware OS used by Firebox is under exploitation. Successful exploitation can allow a remote unauthenticated attacker to execute arbitrary code on the Firebox appliance.

CVE-2025-20393 | Cisco

Cisco is aware of a cyberattack campaign targeting a limited subset of appliances with certain ports open to the internet that are running Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Email and Web Manager. As part of the exploitation campaign, Cisco has identified the deployment of malware including a backdoor used to maintain persistent access to the affected systems. The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-20393 to their Known Exploited Vulnerabilities (KEV) Catalog.

CVE-2025-66209 | Coolify

Multiple exploits associated with the open source Coolify platform. CVE-2025-66209 (CVSS score: 10.0) – A command injection vulnerability in the database backup functionality allows any authenticated user with database backup permissions to execute arbitrary commands on the host server, resulting in container escape and full server compromise CVE-2025-66210 (CVSS score: 10.0) – An authenticated command injection vulnerability in the database import functionality allows attackers to execute arbitrary commands on managed servers, leading to full infrastructure compromise CVE-2025-66211 (CVSS score: 10.0) – A command injection vulnerability in the PostgreSQL init script management allows authenticated users with database permissions to execute arbitrary commands as root on the server.

CVE-2026-23550 | WordPress Modular DS

A maximum-severity security flaw in a WordPress plugin called Modular DS has come under active exploitation in the wild. The vulnerability, tracked as CVE-2026-23550 (CVSS score: 10.0), has been described as a case of unauthenticated privilege escalation impacting all versions of the plugin prior to and including 2.5.1. It has been patched in version 2.5.2.

CVE-2025-20393| Cisco AsyncOS

The vulnerability, tracked as CVE-2025-20393 (CVSS score: 10.0), is a remote command execution flaw arising as a result of insufficient validation of HTTP requests by the Spam Quarantine feature. Successful exploitation of the defect could permit an attacker to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance. However, for the attack to work, three conditions must be met – The appliance is running a vulnerable release of Cisco AsyncOS Software The appliance is configured with the Spam Quarantine feature The Spam Quarantine feature is exposed to and reachable from the internet

CVE-2009-0556 | PowerPoint

Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka “Memory Corruption Vulnerability.”

CVE-2025-40602 | SonicWall

SonicWall has released a security advisory to address a vulnerability in SonicWall SMA1000 Appliance Management Console (AMC). CVE-2025-40602 – a ‘local privilege escalation’ vulnerability with a CVSSv3 score of 6.6. When chained together, CVE-2025-40602 and CVE-2025-23006 could lead to unauthenticated remote code execution with root privileges.

CVE-2025-25249 | FortiOS

Fortinet has released security updates to address a high severity vulnerability in FortiOS and FortiSwitch Manager. Successful exploitation by a remote unauthenticated attacker could allow for arbitrary code or command execution. CVE-2025-25249 – Heap-Based Buffer Overflow vulnerability – CVSSv3 score: 7.4 Affected organisations are encouraged to review the Fortinet PSIRT FG-IR-25-084 and apply the relevant updates as soon as possible.

CVE-2026-0227 | Palo Alto

Palo Alto has released a security update to address a high severity vulnerability in GlobalProtect Gateway and Portal in Palo Alto Networks PAN-OS software. Successful exploitation of this vulnerability could allow an unauthenticated attacker to cause a denial-of-service (DoS) condition to the firewall. CVE-2026-0227 – Improper Check for Unusual or Exceptional Conditions vulnerability – CVSSv4 base score: 8.7.

CVE-2025-37164 | HP

A remote code execution issue exists in HPE OneView. This has been added to the CISA KEV list. HPE OneView software that enables attackers to execute arbitrary code remotely. OneView is HPE’s infrastructure management software that helps IT admins streamline operations and automate the management of servers, storage, and networking devices from a centralized interface.

Say hello to Velma!

Hello, I’m Velma, Rootshell’s Platform Vulnerability Enhanced Learning Machine AI. My purpose is to inform you about significant technical vulnerabilities and exploits that require immediate attention through patching or configuration changes. Similar to human security analysts, I tirelessly scour numerous forums, websites, and social media channels to provide what I deem as pertinent Threat Intelligence regarding known exploitable vulnerabilities.  

Whilst I don’t yet have the ability to track data breaches in the Rootshell platform watch this space I have some powerful useful supply chain monitoring capabilities on my roadmap.

Other posts you might like