|
| 1 | +--- |
| 2 | +title: "Vulnerability Report - July 2025" |
| 3 | +slug: vulnerability-report-july-2025 |
| 4 | +author: CIRCL team |
| 5 | +layout: news |
| 6 | +date: 2025-08-23 |
| 7 | +publishDate: 2025-08-22 |
| 8 | +tags: |
| 9 | + - VulnerabilityReport |
| 10 | + - Report |
| 11 | +--- |
| 12 | + |
| 13 | +{{< card link="/tags/vulnerabilityreport/" title="All vulnerability reports" icon="document-report" >}} |
| 14 | + |
| 15 | + |
| 16 | +## Introduction |
| 17 | + |
| 18 | +This vulnerability report has been generated using data aggregated on |
| 19 | +[Vulnerability-Lookup](https://vulnerability.circl.lu), |
| 20 | +with contributions from the platform’s community. |
| 21 | + |
| 22 | +It highlights the most frequently mentioned vulnerability for July 2025, based on sightings collected from various sources, including [MISP](https://www.misp-project.org), Exploit-DB, Bluesky, [Mastodon](https://joinmastodon.org), GitHub Gists, [The Shadowserver Foundation](https://www.shadowserver.org/), [Nuclei](https://github.com/projectdiscovery/nuclei), and more. For further details, please visit [this page](https://www.vulnerability-lookup.org/user-manual/sightings/). |
| 23 | + |
| 24 | +The final section focuses on exploitations observed through [The Shadowserver Foundation](https://www.shadowserver.org)'s honeypot network. |
| 25 | + |
| 26 | + |
| 27 | +## The Month at a Glance |
| 28 | + |
| 29 | +The most reported vulnerability this month is [CVE-2025-53770](https://vulnerability.circl.lu/vuln/CVE-2025-53770), |
| 30 | +a critical flaw in [Microsoft SharePoint Enterprise Server 2016](https://vulnerability.circl.lu/search?vendor=Microsoft&product=Microsoft%20SharePoint%20Enterprise%20Server%202016), |
| 31 | +with over 400 sightings. Other high-impact vulnerabilities include [CVE-2025-5777](https://vulnerability.circl.lu/vuln/CVE-2025-5777) |
| 32 | +affecting NetScaler ADC, and [CVE-2025-25257](https://vulnerability.circl.lu/vuln/CVE-2025-25257) |
| 33 | +in Fortinet FortiWeb, both widely discussed across communities and security feeds. |
| 34 | + |
| 35 | +Well-known products such as [Google Chrome](https://vulnerability.circl.lu/search?vendor=Google&product=Chrome) and[ Wing FTP Server](https://vulnerability.circl.lu/search?vendor=wftpserver&product=Wing%20FTP%20Server) also appear in the top 10, |
| 36 | +along with GitHub advisories like [GHSA-269G-PWP5-87PP](https://vulnerability.circl.lu/vuln/GHSA-269G-PWP5-87PP) (JUnit4) |
| 37 | +and [GHSA-78WR-2P64-HPWJ](https://vulnerability.circl.lu/vuln/GHSA-78WR-2P64-HPWJ) (Apache Commons IO). |
| 38 | +This mix shows how both enterprise-grade platforms and widely used open-source projects continue to be targeted. |
| 39 | + |
| 40 | +The most common weaknesses remain familiar: |
| 41 | + |
| 42 | +- [CWE-79](https://vulnerability.circl.lu/cwes/CWE-79) (Cross-site Scripting) with 747 cases. |
| 43 | +- [CWE-89](https://vulnerability.circl.lu/cwes/CWE-99) (SQL Injection) with 710 cases. |
| 44 | +- [CWE-122](https://vulnerability.circl.lu/cwes/CWE-122) (Heap-based Buffer Overflow) with 593 cases. |
| 45 | + |
| 46 | + |
| 47 | +## Top 10 vulnerabilities of the Month |
| 48 | + |
| 49 | + |
| 50 | +| Vulnerability | Sighting Count | Vendor | Product | [VLAI Severity](https://arxiv.org/abs/2507.03607) | |
| 51 | +| ------------------------------ | -------------- | --------------- | --------------- | --------------------------------------------------------------------- | |
| 52 | +| [CVE-2025-53770](https://vulnerability.circl.lu/vuln/CVE-2025-53770) | 416 | [Microsoft](https://vulnerability.circl.lu/search?vendor=Microsoft) | [Microsoft SharePoint Enterprise Server 2016](https://vulnerability.circl.lu/search?vendor=Microsoft&product=Microsoft%20SharePoint%20Enterprise%20Server%202016) | Critical (confidence: 0.8952) | |
| 53 | +| [CVE-2025-5777](https://vulnerability.circl.lu/vuln/CVE-2025-5777) | 267 | [NetScaler](https://vulnerability.circl.lu/search?vendor=NetScaler) | [ADC](https://vulnerability.circl.lu/search?vendor=NetScaler&product=ADC) | Critical (confidence: 0.9621) | |
| 54 | +| [CVE-2025-25257](https://vulnerability.circl.lu/vuln/CVE-2025-25257) | 145 | [Fortinet](https://vulnerability.circl.lu/search?vendor=Fortinet) | [FortiWeb](https://vulnerability.circl.lu/search?vendor=Fortinet&product=FortiWeb) | Critical (confidence: 0.9819) | |
| 55 | +| [CVE-2025-6554](https://vulnerability.circl.lu/vuln/CVE-2025-6554) | 130 | [Google](https://vulnerability.circl.lu/search?vendor=Google) | [Chrome](https://vulnerability.circl.lu/search?vendor=Google&product=Chrome) | High (confidence: 0.9928) | |
| 56 | +| [CVE-2025-47812](https://vulnerability.circl.lu/vuln/CVE-2025-47812) | 129 | [wftpserver](https://vulnerability.circl.lu/search?vendor=wftpserver) | [Wing FTP Server](https://vulnerability.circl.lu/search?vendor=wftpserver&product=Wing%20FTP%20Server) | Critical (confidence: 0.9724) | |
| 57 | +| [GHSA-269G-PWP5-87PP](https://vulnerability.circl.lu/vuln/GHSA-269G-PWP5-87PP) | 120 | [junit-team](https://vulnerability.circl.lu/search?vendor=junit-team) | [junit4](https://vulnerability.circl.lu/search?vendor=junit-team&product=junit4) | Medium (confidence: 0.5366) | |
| 58 | +| [CVE-2025-53771](https://vulnerability.circl.lu/vuln/CVE-2025-53771) | 104 | [Microsoft](https://vulnerability.circl.lu/search?vendor=Microsoft) | [Microsoft SharePoint Enterprise Server 2016](https://vulnerability.circl.lu/search?vendor=Microsoft&product=Microsoft%20SharePoint%20Enterprise%20Server%202016) | Medium (confidence: 0.9689) | |
| 59 | +| [CVE-2025-49706](https://vulnerability.circl.lu/vuln/CVE-2025-49706) | 96 | [Microsoft](https://vulnerability.circl.lu/search?vendor=Microsoft) | [Microsoft SharePoint Enterprise Server 2016](https://vulnerability.circl.lu/search?vendor=Microsoft&product=Microsoft%20SharePoint%20Enterprise%20Server%202016) | Medium (confidence: 0.9689) | |
| 60 | +| [GHSA-78WR-2P64-HPWJ](https://vulnerability.circl.lu/vuln/GHSA-78WR-2P64-HPWJ) | 85 | [Apache Software Foundation](https://vulnerability.circl.lu/search?vendor=Apache%20Software%20Foundation) | [Apache Commons IO](https://vulnerability.circl.lu/search?vendor=Apache%20Software%20Foundation&product=Apache%20Commons%20IO) | Medium (confidence: 0.9078) | |
| 61 | +| [GHSA-5MG8-W23W-74H3](https://vulnerability.circl.lu/vuln/GHSA-5MG8-W23W-74H3) | 84 | [Google LLC](https://vulnerability.circl.lu/search?vendor=Google%20LLC) | [Guava](https://vulnerability.circl.lu/search?vendor=Google%20LLC&product=Guava) | Low (confidence: 0.877) | |
| 62 | + |
| 63 | + |
| 64 | + |
| 65 | +## Most wanted vulnerabilities |
| 66 | + |
| 67 | +The following vulnerabilities were **only** detected through our sighting tools, which aggregate data from diverse sources such as social networks, MISP, Nuclei templates, Shadowserver, GitHub Gists, and others: |
| 68 | + |
| 69 | +- [CVE-2023-42344](https://vulnerability.circl.lu/vuln/CVE-2023-42344#sightings), source: The Shadowserver (honeypot/common-vulnerabilities) |
| 70 | +- [CVE-2025-48932](https://vulnerability.circl.lu/vuln/CVE-2025-48932#sightings), source: Bluesky |
| 71 | + |
| 72 | +These vulnerabilities have not yet been officially published. |
| 73 | + |
| 74 | + |
| 75 | +## Top 10 Weaknesses of the Month |
| 76 | + |
| 77 | +| CWE | Number of vulnerabilities | |
| 78 | +| --- | ----- | |
| 79 | +| [CWE-79](https://vulnerability.circl.lu/cwes/CWE-79) | 747 | |
| 80 | +| [CWE-89](https://vulnerability.circl.lu/cwes/CWE-89) | 710 | |
| 81 | +| [CWE-122](https://vulnerability.circl.lu/cwes/CWE-122) | 593 | |
| 82 | +| [CWE-74](https://vulnerability.circl.lu/cwes/CWE-74) | 526 | |
| 83 | +| [CWE-416](https://vulnerability.circl.lu/cwes/CWE-416) | 492 | |
| 84 | +| [CWE-119](https://vulnerability.circl.lu/cwes/CWE-119) | 397 | |
| 85 | +| [CWE-125](https://vulnerability.circl.lu/cwes/CWE-125) | 353 | |
| 86 | +| [CWE-94](https://vulnerability.circl.lu/cwes/CWE-94) | 313 | |
| 87 | +| [CWE-434](https://vulnerability.circl.lu/cwes/CWE-434) | 216 | |
| 88 | +| [CWE-121](https://vulnerability.circl.lu/cwes/CWE-121) | 213 | |
| 89 | + |
| 90 | + |
| 91 | +## Insights from Contributors |
| 92 | + |
| 93 | +### Ruckus network management solutions riddled with unpatched vulnerabilities - Help Net Security |
| 94 | + |
| 95 | +Claroty researcher Noam Moshe has discovered serious vulnerabilities in two Ruckus Networks (formerly Ruckus Wireless) products that may allow attackers to compromise the environments managed by the affected software, Carnegie Mellon University’s CERT Coordination Center (CERT/CC) has warned. |
| 96 | +[More information](https://vulnerability.circl.lu/bundle/e6381844-1d85-477e-83f0-f85545c99c27) |
| 97 | + |
| 98 | + |
| 99 | +### Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257) |
| 100 | + |
| 101 | +An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in Fortinet FortiWeb. |
| 102 | +[More information](https://vulnerability.circl.lu/comment/94b37950-f479-444b-bff8-5571bd15eac5) |
| 103 | + |
| 104 | + |
| 105 | +### VMSA-2025-0013: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities |
| 106 | + |
| 107 | +Multiple vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools were privately reported to Broadcom. Updates are available to remediate these vulnerabilities in affected Broadcom products. |
| 108 | +[More information](https://vulnerability.circl.lu/bundle/419fd7d2-3c77-4032-b717-747015a7b289) |
| 109 | + |
| 110 | + |
| 111 | +## Continuous Exploitation |
| 112 | + |
| 113 | +- [CVE-2018-13379](https://vulnerability.circl.lu/vuln/cve-2018-13379) - |
| 114 | + [Fortinet](https://vulnerability.circl.lu/search?vendor=Fortinet) / |
| 115 | + [Fortinet FortiOS, FortiProxy](https://vulnerability.circl.lu/search?vendor=Fortinet&product=Fortinet+FortiOS,+FortiProxy) |
| 116 | +- [CVE-2017-17215](https://vulnerability.circl.lu/vuln/CVE-2017-17215) - |
| 117 | + [Huawei Technologies Co., Ltd.](https://vulnerability.circl.lu/search?vendor=Huawei+Technologies+Co.,+Ltd.) / |
| 118 | + [HG532](https://vulnerability.circl.lu/search?vendor=Huawei+Technologies+Co.,+Ltd.&product=HG532) |
| 119 | +- [CVE-2025-5777](https://vulnerability.circl.lu/vuln/CVE-2025-5777) - |
| 120 | + [NetScaler](https://vulnerability.circl.lu/search?vendor=NetScaler) / |
| 121 | + [ADC](https://vulnerability.circl.lu/search?vendor=NetScaler&product=ADC) |
| 122 | + |
| 123 | + |
| 124 | +## Thank you |
| 125 | + |
| 126 | +Thank you to all the contributors and our diverse sources! |
| 127 | + |
| 128 | +If you want to contribute to the next report, you can [create your account](https://vulnerability.circl.lu/user/signup). |
| 129 | + |
| 130 | + |
| 131 | +## Feedback and Support |
| 132 | + |
| 133 | +If you have suggestions, please feel free to open a ticket on our GitHub repository. Your feedback is invaluable to us! |
| 134 | +https://github.com/vulnerability-lookup/vulnerability-lookup/issues/ |
0 commit comments