Skip to content

Commit fff5650

Browse files
new: [news] Vulnerability Report - July 2025
1 parent db387b8 commit fff5650

File tree

1 file changed

+134
-0
lines changed

1 file changed

+134
-0
lines changed
Lines changed: 134 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,134 @@
1+
---
2+
title: "Vulnerability Report - July 2025"
3+
slug: vulnerability-report-july-2025
4+
author: CIRCL team
5+
layout: news
6+
date: 2025-08-23
7+
publishDate: 2025-08-22
8+
tags:
9+
- VulnerabilityReport
10+
- Report
11+
---
12+
13+
{{< card link="/tags/vulnerabilityreport/" title="All vulnerability reports" icon="document-report" >}}
14+
15+
16+
## Introduction
17+
18+
This vulnerability report has been generated using data aggregated on
19+
[Vulnerability-Lookup](https://vulnerability.circl.lu),
20+
with contributions from the platform’s community.
21+
22+
It highlights the most frequently mentioned vulnerability for July 2025, based on sightings collected from various sources, including [MISP](https://www.misp-project.org), Exploit-DB, Bluesky, [Mastodon](https://joinmastodon.org), GitHub Gists, [The Shadowserver Foundation](https://www.shadowserver.org/), [Nuclei](https://github.com/projectdiscovery/nuclei), and more. For further details, please visit [this page](https://www.vulnerability-lookup.org/user-manual/sightings/).
23+
24+
The final section focuses on exploitations observed through [The Shadowserver Foundation](https://www.shadowserver.org)'s honeypot network.
25+
26+
27+
## The Month at a Glance
28+
29+
The most reported vulnerability this month is [CVE-2025-53770](https://vulnerability.circl.lu/vuln/CVE-2025-53770),
30+
a critical flaw in [Microsoft SharePoint Enterprise Server 2016](https://vulnerability.circl.lu/search?vendor=Microsoft&product=Microsoft%20SharePoint%20Enterprise%20Server%202016),
31+
with over 400 sightings. Other high-impact vulnerabilities include [CVE-2025-5777](https://vulnerability.circl.lu/vuln/CVE-2025-5777)
32+
affecting NetScaler ADC, and [CVE-2025-25257](https://vulnerability.circl.lu/vuln/CVE-2025-25257)
33+
in Fortinet FortiWeb, both widely discussed across communities and security feeds.
34+
35+
Well-known products such as [Google Chrome](https://vulnerability.circl.lu/search?vendor=Google&product=Chrome) and[ Wing FTP Server](https://vulnerability.circl.lu/search?vendor=wftpserver&product=Wing%20FTP%20Server) also appear in the top 10,
36+
along with GitHub advisories like [GHSA-269G-PWP5-87PP](https://vulnerability.circl.lu/vuln/GHSA-269G-PWP5-87PP) (JUnit4)
37+
and [GHSA-78WR-2P64-HPWJ](https://vulnerability.circl.lu/vuln/GHSA-78WR-2P64-HPWJ) (Apache Commons IO).
38+
This mix shows how both enterprise-grade platforms and widely used open-source projects continue to be targeted.
39+
40+
The most common weaknesses remain familiar:
41+
42+
- [CWE-79](https://vulnerability.circl.lu/cwes/CWE-79) (Cross-site Scripting) with 747 cases.
43+
- [CWE-89](https://vulnerability.circl.lu/cwes/CWE-99) (SQL Injection) with 710 cases.
44+
- [CWE-122](https://vulnerability.circl.lu/cwes/CWE-122) (Heap-based Buffer Overflow) with 593 cases.
45+
46+
47+
## Top 10 vulnerabilities of the Month
48+
49+
50+
| Vulnerability | Sighting Count | Vendor | Product | [VLAI Severity](https://arxiv.org/abs/2507.03607) |
51+
| ------------------------------ | -------------- | --------------- | --------------- | --------------------------------------------------------------------- |
52+
| [CVE-2025-53770](https://vulnerability.circl.lu/vuln/CVE-2025-53770) | 416 | [Microsoft](https://vulnerability.circl.lu/search?vendor=Microsoft) | [Microsoft SharePoint Enterprise Server 2016](https://vulnerability.circl.lu/search?vendor=Microsoft&product=Microsoft%20SharePoint%20Enterprise%20Server%202016) | Critical (confidence: 0.8952) |
53+
| [CVE-2025-5777](https://vulnerability.circl.lu/vuln/CVE-2025-5777) | 267 | [NetScaler](https://vulnerability.circl.lu/search?vendor=NetScaler) | [ADC](https://vulnerability.circl.lu/search?vendor=NetScaler&product=ADC) | Critical (confidence: 0.9621) |
54+
| [CVE-2025-25257](https://vulnerability.circl.lu/vuln/CVE-2025-25257) | 145 | [Fortinet](https://vulnerability.circl.lu/search?vendor=Fortinet) | [FortiWeb](https://vulnerability.circl.lu/search?vendor=Fortinet&product=FortiWeb) | Critical (confidence: 0.9819) |
55+
| [CVE-2025-6554](https://vulnerability.circl.lu/vuln/CVE-2025-6554) | 130 | [Google](https://vulnerability.circl.lu/search?vendor=Google) | [Chrome](https://vulnerability.circl.lu/search?vendor=Google&product=Chrome) | High (confidence: 0.9928) |
56+
| [CVE-2025-47812](https://vulnerability.circl.lu/vuln/CVE-2025-47812) | 129 | [wftpserver](https://vulnerability.circl.lu/search?vendor=wftpserver) | [Wing FTP Server](https://vulnerability.circl.lu/search?vendor=wftpserver&product=Wing%20FTP%20Server) | Critical (confidence: 0.9724) |
57+
| [GHSA-269G-PWP5-87PP](https://vulnerability.circl.lu/vuln/GHSA-269G-PWP5-87PP) | 120 | [junit-team](https://vulnerability.circl.lu/search?vendor=junit-team) | [junit4](https://vulnerability.circl.lu/search?vendor=junit-team&product=junit4) | Medium (confidence: 0.5366) |
58+
| [CVE-2025-53771](https://vulnerability.circl.lu/vuln/CVE-2025-53771) | 104 | [Microsoft](https://vulnerability.circl.lu/search?vendor=Microsoft) | [Microsoft SharePoint Enterprise Server 2016](https://vulnerability.circl.lu/search?vendor=Microsoft&product=Microsoft%20SharePoint%20Enterprise%20Server%202016) | Medium (confidence: 0.9689) |
59+
| [CVE-2025-49706](https://vulnerability.circl.lu/vuln/CVE-2025-49706) | 96 | [Microsoft](https://vulnerability.circl.lu/search?vendor=Microsoft) | [Microsoft SharePoint Enterprise Server 2016](https://vulnerability.circl.lu/search?vendor=Microsoft&product=Microsoft%20SharePoint%20Enterprise%20Server%202016) | Medium (confidence: 0.9689) |
60+
| [GHSA-78WR-2P64-HPWJ](https://vulnerability.circl.lu/vuln/GHSA-78WR-2P64-HPWJ) | 85 | [Apache Software Foundation](https://vulnerability.circl.lu/search?vendor=Apache%20Software%20Foundation) | [Apache Commons IO](https://vulnerability.circl.lu/search?vendor=Apache%20Software%20Foundation&product=Apache%20Commons%20IO) | Medium (confidence: 0.9078) |
61+
| [GHSA-5MG8-W23W-74H3](https://vulnerability.circl.lu/vuln/GHSA-5MG8-W23W-74H3) | 84 | [Google LLC](https://vulnerability.circl.lu/search?vendor=Google%20LLC) | [Guava](https://vulnerability.circl.lu/search?vendor=Google%20LLC&product=Guava) | Low (confidence: 0.877) |
62+
63+
64+
65+
## Most wanted vulnerabilities
66+
67+
The following vulnerabilities were **only** detected through our sighting tools, which aggregate data from diverse sources such as social networks, MISP, Nuclei templates, Shadowserver, GitHub Gists, and others:
68+
69+
- [CVE-2023-42344](https://vulnerability.circl.lu/vuln/CVE-2023-42344#sightings), source: The Shadowserver (honeypot/common-vulnerabilities)
70+
- [CVE-2025-48932](https://vulnerability.circl.lu/vuln/CVE-2025-48932#sightings), source: Bluesky
71+
72+
These vulnerabilities have not yet been officially published.
73+
74+
75+
## Top 10 Weaknesses of the Month
76+
77+
| CWE | Number of vulnerabilities |
78+
| --- | ----- |
79+
| [CWE-79](https://vulnerability.circl.lu/cwes/CWE-79) | 747 |
80+
| [CWE-89](https://vulnerability.circl.lu/cwes/CWE-89) | 710 |
81+
| [CWE-122](https://vulnerability.circl.lu/cwes/CWE-122) | 593 |
82+
| [CWE-74](https://vulnerability.circl.lu/cwes/CWE-74) | 526 |
83+
| [CWE-416](https://vulnerability.circl.lu/cwes/CWE-416) | 492 |
84+
| [CWE-119](https://vulnerability.circl.lu/cwes/CWE-119) | 397 |
85+
| [CWE-125](https://vulnerability.circl.lu/cwes/CWE-125) | 353 |
86+
| [CWE-94](https://vulnerability.circl.lu/cwes/CWE-94) | 313 |
87+
| [CWE-434](https://vulnerability.circl.lu/cwes/CWE-434) | 216 |
88+
| [CWE-121](https://vulnerability.circl.lu/cwes/CWE-121) | 213 |
89+
90+
91+
## Insights from Contributors
92+
93+
### Ruckus network management solutions riddled with unpatched vulnerabilities - Help Net Security
94+
95+
Claroty researcher Noam Moshe has discovered serious vulnerabilities in two Ruckus Networks (formerly Ruckus Wireless) products that may allow attackers to compromise the environments managed by the affected software, Carnegie Mellon University’s CERT Coordination Center (CERT/CC) has warned.
96+
[More information](https://vulnerability.circl.lu/bundle/e6381844-1d85-477e-83f0-f85545c99c27)
97+
98+
99+
### Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257)
100+
101+
An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in Fortinet FortiWeb.
102+
[More information](https://vulnerability.circl.lu/comment/94b37950-f479-444b-bff8-5571bd15eac5)
103+
104+
105+
### VMSA-2025-0013: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities
106+
107+
Multiple vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools were privately reported to Broadcom. Updates are available to remediate these vulnerabilities in affected Broadcom products.
108+
[More information](https://vulnerability.circl.lu/bundle/419fd7d2-3c77-4032-b717-747015a7b289)
109+
110+
111+
## Continuous Exploitation
112+
113+
- [CVE-2018-13379](https://vulnerability.circl.lu/vuln/cve-2018-13379) -
114+
[Fortinet](https://vulnerability.circl.lu/search?vendor=Fortinet) /
115+
[Fortinet FortiOS, FortiProxy](https://vulnerability.circl.lu/search?vendor=Fortinet&product=Fortinet+FortiOS,+FortiProxy)
116+
- [CVE-2017-17215](https://vulnerability.circl.lu/vuln/CVE-2017-17215) -
117+
[Huawei Technologies Co., Ltd.](https://vulnerability.circl.lu/search?vendor=Huawei+Technologies+Co.,+Ltd.) /
118+
[HG532](https://vulnerability.circl.lu/search?vendor=Huawei+Technologies+Co.,+Ltd.&product=HG532)
119+
- [CVE-2025-5777](https://vulnerability.circl.lu/vuln/CVE-2025-5777) -
120+
[NetScaler](https://vulnerability.circl.lu/search?vendor=NetScaler) /
121+
[ADC](https://vulnerability.circl.lu/search?vendor=NetScaler&product=ADC)
122+
123+
124+
## Thank you
125+
126+
Thank you to all the contributors and our diverse sources!
127+
128+
If you want to contribute to the next report, you can [create your account](https://vulnerability.circl.lu/user/signup).
129+
130+
131+
## Feedback and Support
132+
133+
If you have suggestions, please feel free to open a ticket on our GitHub repository. Your feedback is invaluable to us!
134+
https://github.com/vulnerability-lookup/vulnerability-lookup/issues/

0 commit comments

Comments
 (0)