Cybersecurity Forecast 2026: What to Expect – New Report
Explore a curated list of the latest CVEs, with a focus on critical and high-severity vulnerabilities. Stay informed about actively exploited threats and get the insights you need to respond quickly and confidently.
| CVE ID | CVSS | Summary | Link |
|---|---|---|---|
| CVE‑2025‑30208 | 5.3 | CVE-2025-30208 is a medium-severity flaw in the Vite development server that allows attackers to bypass file access restrictions using crafted query strings. It enables arbitrary file reads on network-exposed dev servers running vulnerable Vite versions prior to the fixed releases, potentially exposing sensitive local files. | View |
| CVE-2025-37164 | 10 | CVE‑2025‑37164 is a critical HPE OneView flaw enabling unauthenticated remote code execution and full infrastructure control. Actively exploited with public PoC, it affects versions before 11.00 and requires immediate patching or mitigation. | View |
| CVE-2025-8110 | 8.7 | CVE-2025-8110 is a critical Gogs flaw allowing file overwrite and code execution via symbolic links. Update to version 0.13.3 to fix. | View |
| CVE-2025-55182 | 10.0 | CVE‑2025‑55182 is a critical RCE in React Server Components and Next.js, allowing unauthenticated attackers to run code via unsafe deserialization. Immediate patching is required. | View |
| CVE-2025-61757 | 9.8 | CVE‑2025‑61757 lets attackers bypass authentication and run code on Oracle Identity Manager (v12.2.1.4.0, v14.1.2.1.0). Actively exploited, it’s patched in Oracle’s October 2025 CPU—urgent updates are required. | View |
| CVE-2025-24200 | 6.1 | CVE‑2025‑24200 lets physical attackers bypass USB Restricted Mode on locked iPhones and iPads, risking data exposure. Fixed in iOS 18.3.1 and iPadOS 18.3.1/17.7.5, devices should be updated promptly. | View |
| CVE-2025-20333 | 9.9 | CVE‑2025‑20333 is a critical zero‑day in the VPN web server of Cisco ASA and FTD devices. Due to improper HTTPS input handling, attackers with valid VPN credentials can send crafted requests and execute code as root. It is actively exploited, enabling full device compromise. Cisco has released patches, and upgrading is the only effective remediation. | View |
| CVE‑2025‑24201 | 10.0 | CVE‑2025‑24201 is a critical WebKit bug letting attackers escape the Web Content sandbox on Apple devices. It’s actively exploited and affects iOS, iPadOS, macOS, Safari, visionOS, and watchOS. Patching immediately is strongly recommended to prevent device compromise and data exposure. | View |
| CVE-2025-8941 | 7.8 | CVE‑2025‑8941 is a high‑severity linux‑pam flaw where improper path handling in pam_namespace allows local attackers to exploit symlink and race‑condition weaknesses to gain root privileges. It affects multiple Linux distributions, and remediation requires installing the updated linux‑pam packages provided in vendor security advisories. | View |
| CVE-2025-0411 | 7.0 | CVE‑2025‑0411 is a serious 7‑Zip flaw where extracted files lose the Windows Mark‑of‑the‑Web, allowing attackers to bypass security checks and run code. It affects versions before 24.09 and is already being exploited. Updating to 24.09 fixes the problem. | View |
| CVE-2025-62215 | 7.0 | CVE‑2025‑62215 is a critical Windows Kernel vulnerability caused by a race condition, allowing local low‑privileged users to gain SYSTEM-level access. Actively exploited in the wild, it impacts Windows 10, 11, Server, and 10 ESU, highlighting the urgency for immediate patching and strict enforcement of least-privilege access controls. | View |
| CVE-2025-25012 | 5.4 | CVE-2025-25012 is a medium-severity Kibana flaw that can redirect users to malicious sites. It affects versions 7.0.0 - 9.0.0. Fix by updating or enforcing strict URL validation. | View |
| CVE-2025-64446 | 9.8 | CVE-2025-64446 is a critical FortiWeb path traversal flaw (v7.0.0–8.0.1) that allows unauthenticated attackers to execute admin commands. Fortinet advises updating to the latest patched versions and disabling internet-facing HTTP/HTTPS until systems are secured, while monitoring logs for any unauthorized activity. | View |
| CVE-2025-27636 | 5.6 | CVE-2025-27636 is a medium‑severity Apache Camel flaw. Mixed‑case headers can bypass filters, letting attackers run commands. A public PoC exists. Update to Camel 3.22.4, 4.8.5, or 4.10.2 to fix it. | View |
| CVE-2025-43300 | 8.8 | CVE-2025-43300 is a high severity out of bounds write in Apple’s Image I/O (RawCamera.bundle). Crafted DNG or JPEG lossless files with mismatched metadata can trigger memory corruption, crashes, or targeted code execution. Install Apple’s security updates immediately. CISA lists this CVE as actively exploited. | View |
| CVE-2025-48989 | 7.5 | CVE-2025-48989 is a high-severity Apache Tomcat HTTP/2 bug that can cause DoS by exhausting resources. Patch to Tomcat 9.0.108, 10.1.44, or 11.0.10. | View |
| CVE-2025-4664 | 8.6 | CVE-2025-40778 is a BIND 9 flaw that lets attackers poison DNS caches and redirect users to malicious sites. Updating to fixed versions and enabling DNSSEC can prevent attacks. | View |
| CVE-2025-4664 | 4.3 | CVE-2025-4664 is a Chrome Loader flaw that lets malicious pages abuse Link headers’ referrer-policy to force browsers to send full referrer URLs (including query parameters like OAuth or session tokens) to attacker-controlled hosts. Public PoCs and active exploits were reported. Google patched it in Chrome 136.0.7103.113/.114; update promptly. | View |
| CVE-2025-0108 | 9.1 | CVE-2025-0108 is a critical PAN-OS authentication bypass that allows unauthenticated attackers to reach protected management PHP endpoints by exploiting path confusion between Nginx and Apache with double-encoded requests. Public proof-of-concepts exist and active exploitation has been reported. Affected PAN-OS 10.x and 11.x builds should be patched immediately; restrict management access to trusted IPs until fixed. | View |
| CVE-2025-59287 | 9.8 | CVE-2025-59287 is a critical WSUS flaw that allows remote attackers to execute code without authentication due to unsafe data handling. Active attacks began in October 2025, and Microsoft released urgent patches to fix it. | View |
| CVE-2025-0282 | 9.0 | CVE-2025-0282 is a critical pre‑auth bug in Ivanti Connect Secure (seen since Dec 2024) that lets attackers run commands remotely and install web shells, credential stealers, and persistent backdoors. Mitigate by installing Ivanti’s fix (22.7R2.5), run the Integrity Checker Tool, isolate suspected appliances, and factory‑reset/rebuild if infected. | View |
| CVE-2025-10035 | 10.0 | CVE‑2025‑10035 is a critical deserialization flaw in Fortra’s GoAnywhere MFT License Servlet (CVSS 10.0). Attackers supplying forged license responses can trigger deserialization of malicious objects, causing unauthenticated remote code execution when the Admin Console is reachable. Active exploitation and ransomware activity have been reported. Operators must patch to 7.8.4/7.6.3, remove internet exposure, and hunt for indicators. | View |
| CVE-2025-24085 | 7.8 | CVE-2025-24085 is a critical use‑after‑free flaw in Apple’s media processing (Core Media) that was actively exploited in the wild against older iOS releases. Successful exploitation can let a malicious app run code with elevated privileges; Apple fixed the issue in January 2025—update to iOS/iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3, or visionOS 2.3. | View |
| CVE‑2025‑8088 | 8.4 | CVE-2025-8088 is a Windows WinRAR bug that lets crafted RAR files drop hidden programs outside the chosen folder using NTFS alternate data streams. Update WinRAR to 7.13, avoid RARs from unknown senders, extract suspicious archives in a sandbox, and check %TEMP%, %LOCALAPPDATA%, and Startup for unexpected .exe/.dll/.lnk files. | View |
| CVE-2025-32433 | 10.0 | CVE-2025-32433 is a critical pre-authentication RCE in Erlang/OTP’s SSH server. By sending crafted SSH connection messages (e.g., channel_open/channel_request) before authentication, attackers can execute arbitrary commands without credentials. Public PoCs and real-world exploit activity were observed. Patch immediately to OTP-27.3.3, OTP-26.2.5.11, or OTP-25.3.2.20 to prevent full system compromise. | View |
| CVE-2025-4598 | 4.7 | CVE-2025-4598 is a medium-severity race condition in systemd-coredump allowing a local attacker to crash a SUID process, swap in a non‑SUID binary, and read the privileged core dump—potentially exposing sensitive data like password hashes. Mitigate by setting /proc/sys/fs/suid_dumpable to 0, updating systemd, and auditing core-dump access logs. | View |
| CVE-2025-9556 | 9.8 | CVE-2025-9556 is a critical SSTI in Langchaingo caused by Gonja v1.5.3’s Jinja-like include/extends features. Malicious prompts can force template rendering to read arbitrary files (e.g., /etc/passwd), exposing secrets or enabling code execution. Patch Langchaingo to the RenderTemplateFS fix, disable template parsing for untrusted prompts, and block template directives until fixed. | View |
| CVE-2025-10585 | 9.8 | CVE-2025-10585 is a critical type-confusion zero-day in Chrome’s V8 engine, reported by Google TAG on Sept 16, 2025. It allows arbitrary code execution and possible sandbox escape when victims load malicious webpages. It is being exploited in the wild. Update Chrome right away to 140.0.7339.185/.186 (Windows/macOS) or 140.0.7339.185 (Linux). | View |
| CVE-2025-53786 | 8.0 | CVE-2025-53786 is a critical Microsoft Exchange flaw letting on-premises admins gain higher access in Exchange Online, putting cloud data and admin control at risk. Exploitation may leave minimal audit traces. Mitigation involves applying the April 2025 hotfix, switching to a dedicated hybrid app, cleaning service principal credentials, and monitoring hybrid configurations. | View |
| CVE-2025-20309 | 10.0 | CVE-2025-20309 is a critical vulnerability in Cisco Unified Communications Manager (ES releases 15.0.1.13010-1 through 15.0.1.13017-1) caused by hardcoded root SSH credentials. It allows unauthenticated remote root access, full system takeover, and arbitrary command execution. Cisco fixed it in 15SU3 (July 2025); apply the patch immediately and monitor SSH root logins. | View |
| CVE-2025-31324 | 10 | CVE-2025-31324 is a critical, actively exploited SAP NetWeaver Visual Composer vulnerability allowing unauthenticated unrestricted file uploads that lead to remote code execution and webshell deployment. Listed in CISA’s KEV, it risks host takeover and data theft. Apply SAP Notes 3594142/3604119, restrict or disable the metadata uploader, and hunt for JSP webshells. | View |
| CVE-2025-54576 | 9.1 | CVE-2025-54576 is a critical authentication bypass in oauth2-proxy (≤7.10.0) where skip_auth_routes regexes matched the full request URI including query strings. Attackers can add crafted parameters to bypass authentication. Fixed in v7.11.0 – upgrade immediately. Meanwhile, audit and tighten skip_auth_routes, anchor regex, or strip query parameters before matching. Monitor logs for suspicious requests. | View |
| CVE-2025-5394 | 9.8 | CVE-2025-5394 is an unauthenticated flaw in the Alone WordPress theme (≤ 7.8.3) that lets attackers upload ZIPs via an AJAX action, install webshells, and take full control of the site. Update to Alone 7.8.5+, remove unauthorized files, and monitor admin-ajax activity. | View |
| CVE-2025-6543 | 9.8 | CVE-2025-6543 is a critical memory overflow in Citrix NetScaler ADC/Gateway (VPN, ICA, CVPN, RDP, AAA) that lets unauthenticated attackers crash devices or run code. It’s actively exploited — patch to 14.1-47.46, 13.1-59.19, or 13.1-37.236 now, terminate sessions, monitor for abnormal activity, and upgrade unsupported 12.1/13.0 systems. | View |
| CVE-2025-41237 | 9.3 | CVE-2025-41237 allows a guest VM administrator to trigger an integer underflow in VMware VMCI and execute code on the host. It affects ESXi 7–8, Workstation 17, Fusion 13, and VMware Tools 11–13 — apply updates and restrict guest VM privileges immediately to prevent host compromise. | View |
| CVE-2025-5777 | 9.3 | CVE-2025-5777, also called CitrixBleed 2, is a critical memory overread in Citrix NetScaler ADC and Gateway that allows unauthenticated attackers to steal session tokens, hijack sessions, and bypass MFA. Affected systems include Gateway and AAA virtual servers. Immediate patching to fixed builds and terminating active sessions are essential to prevent unauthorized access and potential network compromise. | View |
| CVE-2025-41236 | 9.3 | CVE-2025-41236 is a serious integer overflow in VMware’s VMXNET3 adapter that lets a guest VM admin run code on the host. Affected products are ESXi, Workstation, and Fusion using VMXNET3. Apply patches immediately and restrict VM admin access to prevent host compromise. | View |
| CVE-2025-54309 | 9.8 | CVE-2025-54309 is a critical CrushFTP flaw (before 10.8.5 and 11.3.4_23) that lets attackers gain full admin access, steal data, and disrupt operations due to weak AS2 validation. Actively exploited, it requires urgent patching to versions 10.8.5_12 or 11.3.4_26 and careful monitoring of server logs. | View |
| CVE-2025-20337 | 10.0 | CVE-2025-20337 is a critical unauthenticated RCE in Cisco Identity Services Engine (ISE) and ISE‑PIC (v3.3.0, v3.4.0), allowing attackers to run code as root via crafted API requests. Actively exploited, update to 3.3 Patch 7 or 3.4 Patch 2 immediately, restrict API access, monitor logs, and investigate for compromise to prevent full takeover. | View |
| CVE-2025-20281 | 10.0 | CVE-2025-20281 is a critical unauthenticated API vulnerability in Cisco ISE/ISE‑PIC that lets attackers execute commands as root. It’s being actively exploited and has no workaround — upgrade to Cisco ISE 3.3 Patch 6 or 3.4 Patch 2 immediately and watch API logs for suspicious requests. | View |
| CVE-2025-40599 | 9.1 | CVE-2025-40599 is a critical SonicWall SMA 100 flaw: attackers with admin credentials can upload malware, take control, and erase logs. Fix by updating to firmware 10.2.2.1‑90sv+, reset passwords/OTP, enable MFA, restrict remote management, and check logs for suspicious activity. | View |
| CVE-2025-49706 | 6.5 | CVE-2025-49706 is a medium SharePoint flaw where attackers can access protected APIs without logging in by spoofing the Referer header. A public proof-of-concept exists and active attacks have been seen. Patch SharePoint (2016/2019/Subscription Edition) with Microsoft’s July 8, 2025 update, block ToolPane via WAF, and monitor for fake Referer requests. | View |
| CVE-2025-23266 | 9.0 | CVE-2025-23266 is a critical NVIDIA Container Toolkit vulnerability (≤1.17.7) and GPU Operator (≤25.3.0) OCI-hook flaw allowing containers to inject LD_PRELOAD libraries and execute code on the host, breaking isolation. Patch to Container Toolkit 1.17.8 and GPU Operator 25.3.1, disable the CUDA-compat hook if needed, and monitor for suspicious LD_PRELOAD usage. | View |
| CVE-2025-49704 | 8.8 | CVE-2025-49704 is a SharePoint vulnerability that lets attackers run code and install web shells, risking server takeover. Apply the July 2025 SharePoint patches, remove suspicious .aspx files, rotate machine keys, and monitor IIS/PowerShell logs for unusual activity. | View |
| CVE-2025-6558 | 8.8 | CVE-2025-6558 is an actively exploited Chrome/Chromium GPU bug (Chrome <138.0.7204.157, Edge <138.0.3351.95) that can escape the browser sandbox via crafted web content. Update browsers immediately, avoid untrusted sites, and watch for browser crashes or unusual GPU activity. | View |
| CVE-2025-1974 | 9.8 | Critical Remote Code Execution in Kubernetes Ingress-NGINX via Unsanitized Annotations: CVE-2025-1974 Decoded | View |
| CVE-2025-47812 | 10 | Wing FTP Server Hit by Critical RCE Vulnerability: CVE-2025-47812 Explained | View |
| CVE-2025-53771 | 7.1 | Critical Authentication Bypass in SharePoint via Spoofed Referer Header: A Deep Dive into CVE-2025-53771 | View |
| CVE‑2025‑6218 | 7.8 | High-Severity Directory Traversal in WinRAR Allows Remote Code Execution: CVE-2025-6218 Explained | View |
| CVE-2025-53770 | 9.8 | Widespread SharePoint Takeover via Auth Bypass and ASPX Web Shells: CVE-2025-53770 Analyzed | View |
A CVE (Common Vulnerabilities and Exposures) is a unique identifier given to a publicly known cybersecurity flaw. It helps researchers and security teams talk about the same issue using a standard reference.
Vulnerabilities in cybersecurity are weaknesses or flaws in software, hardware, or systems that attackers can exploit to gain unauthorized access, disrupt operations, or steal sensitive information.
Each CVE can be linked to a CVSS (Common Vulnerability Scoring System) score, which rates the severity of the vulnerability (from 0 to 10). This score is usually available in the CVE details and helps assess how dangerous the issue is.
You can find CVEs through official databases like NVD, MITRE, vendor advisories, security blogs, or tools like scanners and vulnerability management platforms.
Fixing a CVE usually involves applying a patch or update released by the software vendor. In some cases, temporary workarounds or configuration changes can reduce the risk until a full fix is available.
A CVE is not calculated; it’s a unique ID assigned to a discovered vulnerability. However, the related CVSS score is calculated based on how easy the vulnerability is to exploit, the potential impact, and whether it needs user interaction.
See Fidelis Security platforms in action. Learn how our fast scalable platforms provide full visibility, deep insights, and rapid response to help security teams worldwide protect, detect, respond, and neutralize against advanced cyber adversaries.