Vulnerability Report - August 2025

Vulnerability Report - August 2025

September 11, 2025

 #VulnerabilityReport#Report

All vulnerability reports

Introduction

This vulnerability report has been generated using data aggregated on Vulnerability-Lookup, with contributions from the platform’s community.

It highlights the most frequently mentioned vulnerability for August 2025, based on sightings collected from various sources, including MISP, Exploit-DB, Bluesky, Mastodon, GitHub Gists, The Shadowserver Foundation, Nuclei, and more. For further details, please visit this page.

The Month at a Glance

August 2025 saw continued activity across a range of products and vendors, with WinRAR, Microsoft Exchange (the previous month highlighted Microsoft SharePoint), and NetScaler ADC leading the sightings. Notably, several critical vulnerabilities were actively exploited, including NetScaler ADC (CVE-2025-6543 and CVE-2025-5777) and FortiSIEM (CVE-2025-25256).

Web applications remain a frequent target, with cross-site scripting (CWE-79) and SQL injection (CWE-89) dominating the weakness landscape. The report also highlights unpublished vulnerabilities that attracted attention, suggesting ongoing targeted exploitation and zero-day activity.

Overall, the month emphasizes the importance of timely patching, monitoring for continuous exploitation, and vigilance against both well-known and emerging threats.

Top 10 vulnerabilities of the Month

VulnerabilitySighting CountVendorProductVLAI Severity
CVE-2025-8088193win.rar GmbHWinRARHigh (confidence: 0.9824)
CVE-2025-53786175MicrosoftMicrosoft Exchange Server Subscription Edition RTMHigh (confidence: 0.8193)
CVE-2025-43300128ApplemacOSMedium (confidence: 0.4233)
CVE-2025-6543111NetScalerADCCritical (confidence: 0.9614)
CVE-2025-2525679FortinetFortiSIEMCritical (confidence: 0.6508)
CVE-2025-907465DockerDocker DesktopCritical (confidence: 0.8172)
CVE-2015-205162dlinkdir-645Critical (confidence: 0.54)
CVE-2017-1836861zyxelp660hn-t1a_v2Critical (confidence: 0.9298)
CVE-2025-3132459SAP_SESAP NetWeaver (Visual Composer development server)Critical (confidence: 0.9607)
CVE-2025-577752NetScalerADCCritical (confidence: 0.964)

Top 10 Weaknesses of the Month

Top 10 Weaknesses of the Month

CWECount
CWE-79639
CWE-89374
CWE-74282
CWE-94236
CWE-121206
CWE-78165
CWE-416157
CWE-122157
CWE-119150
CWE-22140

Most wanted vulnerabilities

Sightings detected between 2025-08-01 and 2025-08-31 that are associated with unpublished vulnerabilities.

Vulnerability IDOccurrencesComment
CVE-2023-423448OpenCMS
CVE-2024-280804Gitblit
GHSA-42m8-jxr4-976p2Wildermyth
CVE-2025-90402Workhorse - bundle
CVE-2025-90372Workhorse - bundle

Unpublished vulnerabilities with limited sightings:

Vulnerability IDOccurrences
CVE-2023-349181
CVE-2025-551171
CVE-2025-145531
CVE-2024-551771
GHSA-5pm9-r2m8-rcmj1
GHSA-m42g-xg4c-5f3h1
GHSA-64qc-9x89-rx5j1
CVE-2025-77191
GHSA-c2gv-xgf5-5cc21
CVE-2025-556161
CVE-2025-574971
CVE-2025-259641
CVE-2024-5450781
CVE-2025-259871
CVE-2025-12721
CVE-2025-215891
CVE-2025-265171
CVE-2025-91411
GHSA-wrh9-463x-7wvv1
CVE-2024-465071
CVE-2025-543211
CVE-2025-311431
CVE-2025-316461
CVE-2025-275641
GHSA-r4mf-mr9h-f27m1

Continuous Exploitation

  • CVE-2023-42344 - OpenCMS (also in the “Most wanted vulnerabilities” section)
  • CVE-2015-2051 - D-Link DIR-645 - Sightings from MISP and Shadowserver
  • CVE-2025-5777 - NetScaler ADC - Sightings from Shadowserver and many more.

Insights from Contributors

NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424

NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424.
Multiple vulnerabilities have been discovered in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway). Refer below for further details.

More information

Citrix forgot to tell you CVE-2025–6543 has been used as a zero day since May 2025

Back in late June, Citrix posted a patch for CVE-2025–6543, which they described as “Memory overflow vulnerability leading to unintended control flow and Denial of Service”. Denial of service? Piff the magic dragon, who cares.

No technical details were ever published about the vulnerability. That changes today.

What they forgot to tell you: it allows remote code execution, it was used to widespread compromise Netscaler remote access systems and maintain network access even after patching, webshells have been deployed, and Citrix knew this and just didn’t mention it.

More information

Cache Me If You Can (Sitecore Experience Platform Cache Poisoning to RCE)

The vulnerability affects Sitecore Experience Platform, a widely used Content Management System (CMS). The issue is a cache poisoning attack, which means an attacker can trick the system into storing malicious data in its cache. Later, when the system serves cached content, it unknowingly executes this malicious content.

In this specific case, the cache poisoning can escalate to remote code execution (RCE), meaning the attacker could run arbitrary code on the server, potentially taking full control of the website and the underlying system.

More information

Thank you

Thank you to all the contributors and our diverse sources!

If you want to contribute to the next report, you can create your account.

Feedback and Support

If you have suggestions, please feel free to open a ticket on our GitHub repository. Your feedback is invaluable to us!
https://github.com/vulnerability-lookup/vulnerability-lookup/issues/

Funding

eu_funded_en

The main objective of Federated European Team for Threat Analysis (FETTA) is improvement of Cyber Threat Intelligence (CTI) products available to the public and private sector in Poland, Luxembourg, and the European Union as a whole.
Developing actionable CTI products (reports, indicators, etc) is a complex task and requires an in-depth understanding of the threat landscape and the ability to analyse and interpret large amounts of data. Many SOCs and CSIRTs build their capabilities in this area independently, leading to a fragmented approach and duplication of work.

The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to provide a systematic response facility to computer security threats and incidents. The organization brings to the table its extensive experience in cybersecurity incident management, threat intelligence, and proactive response strategies. With a strong background in developing innovative open source cybersecurity tools and solutions, CIRCL’s contribution to the FETTA project is instrumental in achieving enhanced collaboration and intelligence sharing across Europe.

Press release