CISA Adds 4 New Vulnerabilities to ‘Known Exploited’ List

Published:

spot_img

New Vulnerabilities Added to CISA’s Catalog

The United States Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities Catalog by incorporating four critical vulnerabilities that could pose serious risks to various software environments. Here’s a closer look at each vulnerability and the potential implications for users and organizations.

CVE-2025-31125: A Weakness in Vite

The first entry is CVE-2025-31125, which has been identified in Vite, a popular front-end tooling framework for JavaScript. As indicated in a security update shared on Vite’s GitHub repository in March 2025, this vulnerability grants attackers the ability to read arbitrary files. The issue primarily affects applications that expose the Vite developer server to external networks. The specific versions impacted by this vulnerability are:

  • Vite versions 6.2.0 through 6.2.4
  • Vite versions 6.1.0 through 6.1.3

Organizations using these specific versions should take immediate steps to mitigate exposure.

CVE-2025-34026: Vulnerability in Versa Concerto

Next up is CVE-2025-34026, which affects the SD-WAN orchestration platform Versa Concerto. This vulnerability pertains to versions 12.1.2 through 12.2.0 and was first reported in May 2025, with further updates in November. The flaw stems from an authentication bypass in the Traefik reverse proxy configuration, presenting a potential route for attackers to gain access to administrative endpoints.

Open-source cybersecurity group Project Discovery has conducted comprehensive research on the Versa Concerto platform and has characterized several vulnerabilities that pose substantial security threats. A blog post from Project Discovery highlights various vulnerabilities, including authentication bypasses and remote code execution risks, underscoring the urgency for enterprises utilizing this technology to address these issues swiftly.

CVE-2025-68645: Zimbra Collaboration Concerns

CVE-2025-68645 uncovers a local file inclusion vulnerability found in the Webmail Classic UI of Zimbra Collaboration, versions 10.0 and 10.1. According to the CVE listing, this flaw allows unauthenticated remote attackers to craft specific requests to the /h/rest endpoint. Consequently, this capability enables the inclusion of arbitrary files from the WebRoot directory, raising concerns for Zimbra users regarding unauthorized access to sensitive data.

CVE-2025-54313: Supply Chain Compromise

Lastly, CVE-2025-54313 signifies a supply chain compromise found in eslint-config-prettier, affecting versions 8.10.1, 9.1.1, 10.1.6, and 10.1.7. While this vulnerability was registered in August 2025, it first gained attention in July. Application security firm Socket outlined in a July 19, 2025 blog post how a suspicious activity report on the eslint-config-prettier repository revealed that four new versions were released without any corresponding commits or PRs on GitHub. This discovery led maintainers to uncover malicious code within these new versions, which included a Windows-specific payload that aimed to load node-gyp.dll via rundll32.

Immediate Action Required

With these vulnerabilities now part of CISA’s catalog, it is crucial for developers and organizations utilizing these software products to take proactive measures. Regularly updating software, conducting vulnerability assessments, and adopting robust security practices can help mitigate the risks associated with these newly disclosed vulnerabilities. As the threat landscape continues to evolve, staying informed and prepared is key to maintaining cybersecurity integrity.

spot_img

Related articles

Recent articles

CISA Launches CI Fortify Initiative to Strengthen Critical Infrastructure Against Nation-State Cyber Threats

CISA Launches CI Fortify Initiative to Strengthen Critical Infrastructure Against Nation-State Cyber Threats The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a new...

US Government Accelerates Cybersecurity Response with 72-Hour Patch Cycle as Malware Targets Windows Phone Link and Train Hacker Arrested in Taiwan

US Government Accelerates Cybersecurity Response with 72-Hour Patch Cycle as Malware Targets Windows Phone Link and Train Hacker Arrested in Taiwan In a significant shift...

Vinpearl Partners with Three Major Indian Travel Firms, Unlocking Access to 1.47 Billion Travelers

Vinpearl Partners with Three Major Indian Travel Firms, Unlocking Access to 1.47 Billion Travelers MUMBAI, INDIA - On May 9, 2026, Vinpearl Joint Stock Company...

TCLBANKER Banking Trojan Threatens 59 Financial Platforms Through WhatsApp and Outlook Worms

TCLBANKER Banking Trojan Threatens 59 Financial Platforms Through WhatsApp and Outlook Worms A newly identified Brazilian banking trojan, known as TCLBANKER, has emerged as a...