This Week’s Threat Landscape - Critical Vulnerabilities, Zero-Days, and Botnets

April 4, 2025
Executive Summary
Trending / Critical Vulnerabilities
Exploit Activity and Mass Scanning Observed on Cytellite Sensors
Vulnerabilities abused by Botnet
Vulnerabilities Abused by Malware
PRE-NVD observed for this week
External References
Subscribe to our Reports

Executive Summary

This week saw significant cybersecurity developments, with both newly discovered and previously known critical vulnerabilities under active exploitation. Recent additions to the CISA KEV catalog include severe flaws in Apache Tomcat and CrushFTP, both actively targeted in the wild. WordPress plugins continue to pose a high risk, with critical issues in Bricks Builder, ValvePress Automatic, Startklar Elementor Addons, and GiveWP Donation Plugin leading to remote code execution, SQL injection, and unauthorized access. a-blog cms is also being actively exploited through an untrusted deserialization flaw affecting both supported and legacy versions. Immediate patching is strongly recommended across all impacted systems

Meanwhile, botnet activity surged, as EnemyBot, Sysrv-K, Andoryu, and Androxgh0st targeted Cloud Gateway, GitLab, and PHP vulnerabilities, while Bashlite, BrickerBot, Tsunami, and Mirai ramped up attacks on IoT devices, particularly Eir D1000 modems.

CISA published an analysis of RESURGE, a newly discovered malware variant targeting Ivanti Connect Secure appliances, featuring persistence mechanisms, credential theft, and privilege escalation. Kaspersky exposed a state-sponsored cyber-espionage campaign dubbed Operation ForumTroll, which exploited a zero-day vulnerability in Google Chrome to deliver malware via phishing emails to Russian media and academic institutions. Trend Micro detailed another espionage operation by the Water Gamayun threat group, leveraging a flaw in Microsoft’s Management Console to deploy an advanced malware toolkit for data theft and long-term system compromise.  

Meanwhile, Elastic Security Labs examined the OUTLAW Linux malware, which uses simple yet effective SSH brute-force attacks and persistence tactics to establish and grow a botnet. These developments highlight the continued advancement of attacker techniques and the urgent need for proactive patching, phishing mitigation, and comprehensive endpoint protection.

Trending / Critical Vulnerabilities

Current trending vulnerabilities offer insights into the latest emerging and widely discussed threats, helping to make informed decisions.  

CVE-2025-24813

A critical path equivalence vulnerability in Apache Tomcat versions 11.0.0-M1 through 11.0.2, 10.1.0-M1 through 10.1.34, and 9.0.0.M1 through 9.0.98. The flaw stems from improper handling of file paths containing internal dots, which can allow unauthenticated remote attackers to execute arbitrary code, access sensitive files, or inject malicious content under certain non-default configurations. With a CVSS v3 base score of 9.8, this vulnerability is classified as critical. Public proof-of-concept exploits are available, and active exploitation has been observed in the wild, prompting its inclusion in CISA’s Known Exploited Vulnerabilities (KEV) catalog. Administrators are strongly urged to upgrade to Apache Tomcat versions 11.0.3, 10.1.35, or 9.0.99 to mitigate the risk.

CVE-2025-2825

A critical authentication bypass vulnerability affects CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0, caused by improper handling of S3 authorization headers. This flaw allows remote, unauthenticated attackers to impersonate users—including administrators—and perform privileged actions such as data access and administrative operations. With a CVSS score of 9.8, the vulnerability is classified as highly severe. A public proof-of-concept (PoC) exploit is available, and active exploitation has been observed in the wild. Users are strongly urged to update to CrushFTP version 10.8.4 or 11.3.1

CVE-2025-31103

A critical untrusted data deserialization vulnerability has been discovered in a-blog cms, a content management system developed by Appleple Inc., which allows attackers to upload arbitrary files to the server via specially crafted requests—potentially resulting in remote script execution and full server compromise. Assigned a CVSS v3 base score of 7.5, this high-severity vulnerability has been actively exploited in the wild, particularly targeting versions 2.8.x and later, although unsupported versions 2.7 and earlier are also affected. It’s crucial to note that, “according to the developer, a-blog cms Ver.2.7 and earlier versions, which are now unsupported, are affected as well.The primary mitigation is to update a-blog cms to the latest patched release as advised by the developer, as applying the official fix is essential to preventing further exploitation and securing affected systems.

CVE-2024-25600

CVE-2024-25600 is a critical unauthenticated remote code execution (RCE) vulnerability in the Bricks Builder theme for WordPress, affecting versions up to and including 1.9.6. This flaw allows attackers to execute arbitrary PHP code on the server without authentication, potentially leading to full site compromise. The vulnerability has been assigned a CVSS v3 base score of 10.0, indicating its high severity. Public exploitation is available, and active exploitation has been observed in the wild. Administrators are strongly advised to update to version 1.9.6.1 or later to mitigate this issue.

CVE-2024-27956

A critical SQL Injection vulnerability has been identified in the ValvePress Automatic plugin for WordPress, affecting versions up to and including 3.92.0. This flaw allows unauthenticated attackers to execute arbitrary SQL queries, which can lead to unauthorized access, data exfiltration, or the creation of rogue administrative accounts. Assigned a CVSS v3.1 base score of 9.8, the vulnerability is considered highly severe. Active exploitation has been reported in the wild, with attackers leveraging the flaw to compromise WordPress sites. proof-of-concept (PoC) code available in public, further increasing the risk of widespread abuse. Users are strongly urged to upgrade to version 3.92.1 or later, which includes the necessary security patch to mitigate this vulnerability.

CVE-2024-4345

A critical vulnerability in the Startklar Elementor Addons plugin for WordPress, affecting versions up to and including 1.7.13, arises from insufficient file type validation in the process function of the startklarDropZoneUploadProcess class, allowing unauthenticated attackers to upload arbitrary files to the server, potentially leading to remote code execution. The National Vulnerability Database (NVD) has assigned it a CVSS v3.1 base score of 9.8, classifying it as critical. Although no public proof-of-concept (PoC) is available, the vulnerability is reportedly being actively exploited in the wild. Users are strongly advised to update to version 1.7.14 or later to mitigate the risk.

CVE-2024-8353

A critical code injection vulnerability in the GiveWP – Donation Plugin and Fundraising Platform for WordPress, affecting versions up to and including 3.16.1. This flaw arises from the deserialization of untrusted input via parameters such as 'give_title' and 'card_address', allowing unauthenticated attackers to inject PHP objects. The presence of a Property-Oriented Programming (POP) chain further enables attackers to delete arbitrary files and achieve remote code execution. The National Vulnerability Database (NVD) has assigned this vulnerability a CVSS v3.1 base score of 9.8, categorizing it as critical. While version 3.16.1 addressed the issue partially, comprehensive hardening was implemented in version 3.16.2. Users are strongly advised to update to version 3.16.2 or later to mitigate this vulnerability.

Exploit Activity and Mass Scanning Observed on Cytellite Sensors

Telemetry collected from Loginsoft sensors were analyzed and processed to derive insights on what is actively being exploited and actively being scanned.  As source of truth, source IPv4 addresses & payloads can be provided on need-to-know basis.

Vulnerabilities Product Severity Title Exploited – in the-wild CISA KEV
CVE-2024-47176 CUPS Medium Improper Input Validation Vulnerability in OpenPrinting CUPS browsed through 2.0.1 leads to remote code execution True False
CVE-2024-4577 PHP-CGI on Windows High Critical argument injection vulnerability in PHP on Windows servers True True
CVE-2024-3721 TBK DVR devices Medium OS Command Injection vulnerability in TBK DVR-4104 and DVR-4216 up to 20240412 True False
CVE-2024-3400 Palo Alto Networks PAN-OS Critical Command Injection Vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS True True
CVE-2024-0986 Issabel PBX Critical Authenticated Remote Code Execution Vulnerability in Asterisk-Cli module in Issabel PBX 4.0.0. True False
CVE-2023-24488 Citrix ADC and Citrix Gateway Medium Cross Site Scripting Vulnerability in Citrix ADC and Citrix Gateway allows an attacker to perform cross site scripting True False
CVE-2023-26801 LB-LINK Critical Command injection vulnerability in LB-LINK devices. True False
CVE-2023-38646 Metabase open source and Enterprise Critical Remote Code Execution Vulnerability in Metabase open source and Metabase Enterprise True False
CVE-2023-4169 Ruijie RG-EW1200G 1.0(1)B1P5 High Improper Access Control vulnerability in the Ruijie RG-EW1200G router's /api/sys/set_passwd endpoint lacks proper access controls, enabling authenticated low-privileged users to reset the administrator password without authorization True False
CVE-2022-41040 Microsoft Exchange Server High Server-Side Request Forgery (SSRF) Vulnerability in Microsoft Exchange Server True True
CVE-2022-47945 ThinkPHP Framework Critical Path Traversal Vulnerability in ThinkPHP Framework leads to arbitrary code execution. True False

Vulnerabilities abused by Botnet

Identified vulnerabilities exploited by botnets, including recent CVEs logged in Misp. Presenting the top 5 CVEs with payloads suggestive of botnet activities, like utilizing wget with IP addresses.

Vulnerability Product Title Exploit Abused by Botnet
CVE-2022-22947 Spring Cloud Gateway Remote Code Execution Vulnerability in Spring Cloud Gateway prior to 3.1.1+ and 3.0.7+ True EnemyBot
Sysrv-K
CVE-2021-22205 Gitlab-Exiftool Remote Code Execution Vulnerability in Gitlab-Exiftool True Andoryu
CVE-2017-9841 Util/PHP/eval-stdin.php in PHPUnit Arbitrary PHP Code Execution Vulnerability in Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 True AndroxGh0st
CVE-2016-10372 Eir D1000 modem Improper Protocol Access Control Vulnerability in Eir D1000 modem. True Bashlite
BrickerBot
Tsunami
Mirai

Vulnerabilities Abused by Malware

We proactively monitor the vulnerabilities which are targeted by adversaries. Each vulnerability is humanly studied and mapped with Mitre ATT&CK tactics and techniques. Source of information is derived from our vulnerability intelligence platform collected and curated information from various sources such as Twitter, Telegram, OSINT groups, Blogs, Data leak Sites and more.  

CVE-2025-0282

The Cybersecurity and Infrastructure Security Agency (CISA) has released a Malware Analysis Report detailing a new malware variant, RESURGE, linked to the exploitation of CVE-2025-0282 in Ivanti Connect Secure appliances. RESURGE shares functionalities with the SPAWNCHIMERA malware, including persistence across reboots, but introduces unique commands that create web shells, manipulate integrity checks, and modify files. These capabilities enable credential harvesting, unauthorized account creation, password resets, and privilege escalation.

CVE-2025-2783

Kaspersky's Global Research and Analysis Team (Great) has uncovered a state-sponsored APT attack, dubbed Operation ForumTroll, which exploits a zero-day vulnerability, CVE-2024-2783, in Google Chrome to conduct cyber-espionage against Russian media professionals and academic institutions. attack begins with phishing emails impersonating invitations to the Primakov Readings forum, containing malicious links that redirect victims to an attacker-controlled website. If a Windows PC user with Google Chrome or any Chromium-based browser clicks the link, malware is deployed automatically, requiring no further action from the victim. The CVE-2025-2783 vulnerability, a logic flaw between Chrome and the Windows operating system, enables sandbox protection bypass, allowing attackers to execute remote code. Kaspersky reported the flaw to Google, which swiftly released a patch. Given the highly targeted nature of the attack, organizations are urged to immediately apply the latest Chrome security update and strengthen their phishing defenses to mitigate the risk.  

CVE-2025-26633

Trend Micro Research has uncovered a cyber-espionage campaign orchestrated by the Russian threat actor Water Gamayun (also known as EncryptHub and Larva-208), which exploits a zero-day vulnerability, CVE-2025-26633 in the Microsoft Management Console (MMC) framework to execute malicious code. Dubbed MSC EvilTwin, this attack technique manipulates .mscfiles and the Multilingual User Interface Path (MUIPath) to download and execute malicious payloads, establish persistence and exfiltrate sensitive data from compromised systems. This vulnerability allows attackers to infiltrate target environments using a sophisticated arsenal of malware, including the EncryptHub stealer, DarkWisp backdoor, SilentPrism backdoor, MSC EvilTwin loader, Stealc and Rhadamanthys stealer.

CVE-2016-5195 & CVE-2016-8655

The Elastic Security Labs blog post titled Outlaw Linux Malware Persistent, Unsophisticated, and Surprisingly Effective" examines OUTLAW, a persistent Linux-based malware that utilizes basic yet effective techniques to establish and maintain a botnet. The malware initiates attacks through SSH brute-force methods, targeting systems with weak credentials. Once access is gained, it deploys components such as a modified XMRig cryptocurrency miner, an IRC-based remote-control tool named STEALTH SHELLBOT, and a custom brute-force tool called BLITZ. OUTLAW ensures persistence by eliminating competing malware and establishing mechanisms like SSH key manipulation and cron job scheduling. Additionally, it propagates by using compromised hosts to launch further SSH brute-force attacks within local subnets.

Vulnerability Severity Title Patch Targeted By Malware OSS
CVE-2025-0282 Critical Stack Based Buffer Overflow vulnerability in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 Yes RESURGE False
CVE-2025-2783 High Sandbox Escape Vulnerability in Mojo within Google Chrome for Windows Yes Operation ForumTroll APT False
CVE-2025-26633 High Improper Neutralization Vulnerability in the Microsoft Windows Management Console (MMC) Yes Water Gamayun
EncryptHub Stealer
DarkWisp backdoor
SilentPrism backdoor
MSC EvilTwin loader
Stealc
Rhadamanthys stealer
False
CVE-2016-5195 High Race condition vulnerability in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 Yes XMRig
SHELLBOT
Outlaw/Dot
True
CVE-2016-8655 High Race Condition vulnerability in Linux Kernel through 4.8.12 Yes XMRig
SHELLBOT
Outlaw/Dot
True

PRE-NVD observed for this week

It refers to vulnerabilities discovered and potentially exploited before their official inclusion in the National Vulnerability Database. The LOVI Platform aggregates and distributes data from open sources and social media, currently tracking over 100 security alerts and planning to expand.

CVE-ID Type of Vulnerability Product Reference
CVE-2025-0083 Local Privilege Escalation Android Resource
CVE-2025-0097 Local Privilege Escalation Android Resource
CVE-2025-23092 Reflected Cross-site Scripting MiContact Center Business Resource
CVE-2025-31161 Authentication Bypass CrushFTP Resource
CVE-2024-12361 NULL Pointer Dereference FFmpeg Resource

External References

  1. https://securityonline.info/cve-2025-31103-zero-day-vulnerability-discovered-in-a-blog-cms-act-now-to-protect-your-web-server/
  2. https://www.cisa.gov/news-events/alerts/2025/04/01/cisa-adds-one-known-exploited-vulnerability-catalog
  3. https://thehackernews.com/2025/03/hackers-exploit-wordpress-mu-plugins-to.html
  4. https://www.trendmicro.com/en_us/research/25/c/cve-2025-26633-water-gamayun.html  
  5. https://www.kaspersky.co.in/blog/forum-troll-apt-with-zero-day-vulnerability/28692/  
  6. https://www.cisa.gov/news-events/alerts/2025/03/28/cisa-releases-malware-analysis-report-resurge-malware-associated-ivanti-connect-secur
  7. https://www.elastic.co/security-labs/outlaw-linux-malware
  8. https://thehackernews.com/2025/04/outlaw-group-uses-ssh-brute-force-to.html?m=1

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Latest Reports

Latest Reports