Vulnerability Report - December 2025

All vulnerability reports

Introduction

This vulnerability report has been generated using data aggregated on Vulnerability-Lookup, with contributions from the platform’s community.

It highlights the most frequently mentioned vulnerability for December 2025, based on sightings collected from various sources, including MISP, Exploit-DB, Bluesky, Mastodon, GitHub Gists, The Shadowserver Foundation, Nuclei, SPLOITUS, Metasploit, and more. For further details, please visit this page.

A new section dedicated to detection rules is available.

The Month at a Glance

December 2025 was dominated by a massive surge in activity surrounding CVE-2025-55182 affecting Meta’s react-server-dom-webpack. With 852 sightings, this critical vulnerability (referenced by contributors as “React2Shell”) significantly outpaced all other vulnerabilities, highlighting a major focus on web application infrastructure exploitation.

Database and network security were also primary themes this month. MongoDB (CVE-2025-14847) ranked second in sightings and was added to the CISA Known Exploited Vulnerabilities (KEV) catalog on December 29th. The networking sector remained volatile, with critical vulnerabilities in Cisco Secure Email, WatchGuard Fireware OS, Fortinet, and SonicWall appearing in both the top sightings and the CISA KEV list.

Despite the influx of 2025 vulnerabilities, “zombie” vulnerabilities continue to plague the internet. Legacy issues from 2015 (D-Link) and 2017 (Zyxel) persist in the Top 10, proving that unpatched IoT devices remain active attack vectors years after disclosure.

In the broader ecosystem, CISA added a wide variety of threats to their catalog, ranging from mobile operating systems (iOS, Android) and browsers (Chrome) to desktop utilities like WinRAR. Additionally, community contributors highlighted significant structural shifts, notably the End-of-Life status for the Linux 5.4 kernel and new cryptographic implementation flaws in GnuPG.

Evolution of published CVE in 2025

Evolution of published CVE in 2025

More information.

Top 10 Vendors of the Month

Top 10 Vendors of the Month

Top 10 Assigners of the Month

Top 10 Assigners of the Month

Top 10 vulnerabilities of the Month

VulnerabilitySighting CountVendorProductVLAI Severity
CVE-2025-55182852Metareact-server-dom-webpackCritical (confidence: 0.9783)
CVE-2025-14847204MongoDB Inc.MongoDB ServerHigh (confidence: 0.9538)
CVE-2025-2039389CiscoCisco Secure EmailCritical (confidence: 0.5137)
CVE-2015-205162dlinkdir-645High (confidence: 0.607)
CVE-2017-1836862zyxelp660hn-t1a_v1Critical (confidence: 0.9763)
CVE-2025-1473360WatchGuardFireware OSCritical (confidence: 0.976)
CVE-2025-6651657Apache Software FoundationApache Tika coreHigh (confidence: 0.8155)
CVE-2018-1056256dasannetworksgpon_routerCritical (confidence: 0.9815)
CVE-2025-4060253SonicWallSMA1000Medium (confidence: 0.9162)
CVE-2025-5971853FortinetFortiSwitchManagerCritical (confidence: 0.7339)

Known Exploited Vulnerabilities

New entries have been added to major Known Exploited Vulnerabilities catalogs.

CISA

CVE IDDate AddedVendorProductVLAI Severity
CVE-2025-1484729/12/25MongoDB Inc.MongoDB ServerHigh (confidence: 0.9538)
CVE-2023-5216322/12/25digieverds-2105_proHigh (confidence: 0.9141)
CVE-2025-1473319/12/25WatchGuardFireware OSCritical (confidence: 0.976)
CVE-2025-2039317/12/25CiscoCisco Secure EmailCritical (confidence: 0.5137)
CVE-2025-4060217/12/25SonicWallSMA1000Medium (confidence: 0.9162)
CVE-2025-5937417/12/25ASUSlive updateCritical (confidence: 0.7584)
CVE-2025-5971816/12/25FortinetFortiSwitchManagerCritical (confidence: 0.7339)
CVE-2025-4352915/12/25AppleiOS and iPadOSHigh (confidence: 0.9918)
CVE-2025-1461115/12/25GladinetCentreStack and TrioFoxHigh (confidence: 0.8669)
CVE-2025-1417412/12/25GoogleChromeHigh (confidence: 0.8175)
CVE-2018-406312/12/25sierrawirelessaleosHigh (confidence: 0.7137)
CVE-2025-5836011/12/25geoservergeoserverHigh (confidence: 0.5288)
CVE-2025-6222109/12/25MicrosoftWindows 10 Version 1809High (confidence: 0.9943)
CVE-2025-621809/12/25RARLABWinRARHigh (confidence: 0.9977)
CVE-2025-6664408/12/25Array NetworksArrayOS AGHigh (confidence: 0.8361)
CVE-2022-3705508/12/25dlinkgo-rt-ac750Critical (confidence: 0.9698)
CVE-2025-5518205/12/25Metareact-server-dom-webpackCritical (confidence: 0.9783)
CVE-2021-2682803/12/25scadabrscadabrHigh (confidence: 0.7378)
CVE-2025-4863302/12/25GoogleAndroidHigh (confidence: 0.8796)
CVE-2025-4857202/12/25GoogleAndroidHigh (confidence: 0.9629)

ENISA

No new entry in December.

Top 10 Weaknesses of the Month

Top 10 Weaknesses of the Month

Click the image for more information.

Detection rules

CVE-2025-55182

CVE-2015-2051

CVE-2017-18368

CVE-2025-66516

CVE-2023-52163

Ghost CVE Report

A ghost CVE is a vulnerability identifier that’s already popped up in the wild but is still listed as RESERVED or NOT_FOUND in official registries like NVD or MITRE.

Sightings detected between 2025-12-01 and 2025-12-31 that are associated with vulnerabilities without public records.

Vulnerability IDOccurrencesComment
CVE-2023-4234411OpenCMS Unauthenticated XXE Vulnerability
CVE-2025-142699Credential caching in Headlamp with Helm enabled
CVE-2025-142826dropbear: privilege escalation via unix domain socket forwardings
CVE-2025-145585FreeBSD IPv6 Flaw Enables Remote Code Execution Attacks
CVE-2025-98202gnutls 3.8.11 released with fix for CVE-2025-9820
CVE-2025-663872QL Injection in Orkes Conductor
CVE-2025-659952Apache Airflow: Disclosure of secrets to UI via kwargs

Insights from Contributors

Thank you

Thank you to all the contributors and our diverse sources!

If you want to contribute to the next report, you can create your account.

Feedback and Support

If you have suggestions, please feel free to open a ticket on our GitHub repository. Your feedback is invaluable to us!
https://github.com/vulnerability-lookup/vulnerability-lookup/issues/

Funding

eu_funded_en

The main objective of Federated European Team for Threat Analysis (FETTA) is improvement of Cyber Threat Intelligence (CTI) products available to the public and private sector in Poland, Luxembourg, and the European Union as a whole.
Developing actionable CTI products (reports, indicators, etc) is a complex task and requires an in-depth understanding of the threat landscape and the ability to analyse and interpret large amounts of data. Many SOCs and CSIRTs build their capabilities in this area independently, leading to a fragmented approach and duplication of work.

The Computer Incident Response Center Luxembourg (CIRCL) is a government-driven initiative designed to provide a systematic response facility to computer security threats and incidents. The organization brings to the table its extensive experience in cybersecurity incident management, threat intelligence, and proactive response strategies. With a strong background in developing innovative open source cybersecurity tools and solutions, CIRCL’s contribution to the FETTA project is instrumental in achieving enhanced collaboration and intelligence sharing across Europe.

Press release