Vulnerability Report - July 2025
Introduction
This vulnerability report has been generated using data aggregated on Vulnerability-Lookup, with contributions from the platform’s community.
It highlights the most frequently mentioned vulnerability for July 2025, based on sightings collected from various sources, including MISP, Exploit-DB, Bluesky, Mastodon, GitHub Gists, The Shadowserver Foundation, Nuclei, and more. For further details, please visit this page.
The final section focuses on exploitations observed through The Shadowserver Foundation’s honeypot network.
The Month at a Glance
The most reported vulnerability this month is CVE-2025-53770, a critical flaw in Microsoft SharePoint Enterprise Server 2016, with over 400 sightings. Other high-impact vulnerabilities include CVE-2025-5777 affecting NetScaler ADC, and CVE-2025-25257 in Fortinet FortiWeb, both widely discussed across communities and security feeds.
Well-known products such as Google Chrome and Wing FTP Server also appear in the top 10, along with GitHub advisories like GHSA-269G-PWP5-87PP (JUnit4) and GHSA-78WR-2P64-HPWJ (Apache Commons IO). This mix shows how both enterprise-grade platforms and widely used open-source projects continue to be targeted.
The most common weaknesses remain familiar:
- CWE-79 (Cross-site Scripting) with 747 cases.
- CWE-89 (SQL Injection) with 710 cases.
- CWE-122 (Heap-based Buffer Overflow) with 593 cases.
Top 10 vulnerabilities of the Month
Vulnerability | Sighting Count | Vendor | Product | VLAI Severity |
---|---|---|---|---|
CVE-2025-53770 | 416 | Microsoft | Microsoft SharePoint Enterprise Server 2016 | Critical (confidence: 0.8952) |
CVE-2025-5777 | 267 | NetScaler | ADC | Critical (confidence: 0.9621) |
CVE-2025-25257 | 145 | Fortinet | FortiWeb | Critical (confidence: 0.9819) |
CVE-2025-6554 | 130 | Chrome | High (confidence: 0.9928) | |
CVE-2025-47812 | 129 | wftpserver | Wing FTP Server | Critical (confidence: 0.9724) |
GHSA-269G-PWP5-87PP | 120 | junit-team | junit4 | Medium (confidence: 0.5366) |
CVE-2025-53771 | 104 | Microsoft | Microsoft SharePoint Enterprise Server 2016 | Medium (confidence: 0.9689) |
CVE-2025-49706 | 96 | Microsoft | Microsoft SharePoint Enterprise Server 2016 | Medium (confidence: 0.9689) |
GHSA-78WR-2P64-HPWJ | 85 | Apache Software Foundation | Apache Commons IO | Medium (confidence: 0.9078) |
GHSA-5MG8-W23W-74H3 | 84 | Google LLC | Guava | Low (confidence: 0.877) |
Most wanted vulnerabilities
The following vulnerabilities were only detected through our sighting tools:
- CVE-2023-42344, source: The Shadowserver (honeypot/common-vulnerabilities)
- CVE-2025-48932, source: Bluesky
These vulnerabilities have not yet been officially published.
Top 10 Weaknesses of the Month
CWE | Number of vulnerabilities |
---|---|
CWE-79 | 747 |
CWE-89 | 710 |
CWE-122 | 593 |
CWE-74 | 526 |
CWE-416 | 492 |
CWE-119 | 397 |
CWE-125 | 353 |
CWE-94 | 313 |
CWE-434 | 216 |
CWE-121 | 213 |
Insights from Contributors
Ruckus network management solutions riddled with unpatched vulnerabilities - Help Net Security
Claroty researcher Noam Moshe has discovered serious vulnerabilities in two Ruckus Networks (formerly Ruckus Wireless) products that may allow attackers to compromise the environments managed by the affected software, Carnegie Mellon University’s CERT Coordination Center (CERT/CC) has warned.
More information
Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257)
An improper neutralization of special elements used in an SQL command (‘SQL Injection’) vulnerability [CWE-89] in Fortinet FortiWeb.
More information
VMSA-2025-0013: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities
Multiple vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools were privately reported to Broadcom. Updates are available to remediate these vulnerabilities in affected Broadcom products.
More information
Continuous Exploitation
- CVE-2018-13379 - Fortinet / Fortinet FortiOS, FortiProxy
- CVE-2017-17215 - Huawei Technologies Co., Ltd. / HG532
- CVE-2025-5777 - NetScaler / ADC
Thank you
Thank you to all the contributors and our diverse sources!
If you want to contribute to the next report, you can create your account.
Feedback and Support
If you have suggestions, please feel free to open a ticket on our GitHub repository. Your feedback is invaluable to us!
https://github.com/vulnerability-lookup/vulnerability-lookup/issues/