CISA Weekly Vulnerability Summary – Week of July 14, 2025

I have reviewed the CISA bulletin of newly reported vulnerabilities for the week of July 14, 2025. It is a compilation of recently discovered flaws, mostly classified as critical (CVSS score 7.0–10.0).

As a CERT manager, I am providing here a detailed analysis of these vulnerabilities. I have grouped them by vendor, highlighting each flaw and its potential impact.

The main objective is to provide CERT/CSIRT/SOC/CISO teams with a clear overview of the critical risks identified that week, in order to prioritize mitigation measures and patches. I am not bound by any length limitation, which allows me to address each point in depth.

Below, vendor by vendor, I describe the critical vulnerabilities (CVSS ≥ 7.0) announced that week, with the context, the nature of the flaw, its possible impact, and any notable information such as the availability of a fix or active exploitation. Note: All CVE identifiers mentioned correspond to vulnerabilities published during the week of 07/14/2025, according to CISA sources.

Critical Vulnerabilities by Vendor

aapanel
aapanel WP Toolkit (WordPress) – A privilege escalation vulnerability was discovered in the aapanel WP Toolkit plugin (versions 1.0 to 1.1). Due to the absence of authorization checks in the auto_login() function, an authenticated attacker, even with low privileges (a simple subscriber), can bypass role controls and gain full administrator privileges on the WordPress site. Associated CVE: CVE-2025-6813, CVSS score 8.8. This flaw would allow an initially limited attacker to take full control of the site.

aaroncampbell
Attachment Manager (WordPress) – The Attachment Manager plugin (up to v2.1.2) contains an arbitrary file deletion flaw. A lack of path validation in the handle_actions() function allows an unauthenticated attacker to delete arbitrary files on the server. The impact is critical (CVSS 9.1, CVE-2025-7643), as deleting sensitive files like wp-config.php could lead to remote code execution (RCE) by compromising the site’s configuration.

Adrian Tobey
Groundhogg (WordPress) – An “unrestricted file upload” vulnerability has been reported in Groundhogg (up to v4.2.1). It allows an attacker to upload a webshell (arbitrary malicious file) onto the server. CVE: CVE-2025-48300, CVSS 9.1. In practice, an attacker with access to the plugin could exploit this flaw to drop and execute malicious code on the WordPress host.

Alcatel-Lucent
OmniAccess Stellar (Wi-Fi Access Points) – Three critical vulnerabilities have been identified in Alcatel-Lucent’s OmniAccess Stellar products:

arisoft
Contact Form 7 – Editor Button (WordPress) – This plugin (v1.0.0 and earlier) contains a reflected Cross-Site Scripting (XSS) flaw. Due to the lack of proper sanitization of user input during page rendering, an attacker could inject malicious JavaScript code into the URL or a field, causing it to execute in the administrator’s browser. CVE: CVE-2025-48345, CVSS 7.1.

Atakan Au
Import CDN/Remote Images (WordPress) – Cross-Site Request Forgery (CSRF) vulnerability leading to stored XSS. In the Import CDN/Remote Images plugin (up to v2.1.2), an attacker can trick an administrator, via a crafted request, into performing an action that results in the permanent injection of malicious code (stored) into the site. CVE: CVE-2025-48153, CVSS 7.1.

August Infotech
Multi-language Responsive Contact Form (WordPress) – This plugin (up to v2.8) suffers from a lack of authentication on certain features, allowing unauthorized users to access actions that are normally restricted (ACL control violation). CVE: CVE-2025-29000, CVSS 7.5. This weakness could be exploited to access sensitive contact form functions without being an administrator.

awethemes
Hillter (WordPress theme) – The Hillter theme (up to v3.0.7) contains an insecure deserialization vulnerability, leading to PHP object injection. CVE: CVE-2025-24777, CVSS 8.8. An attacker could exploit malformed data to execute arbitrary code during server-side deserialization.

b1accounting
B1.lt (WordPress) – This plugin (up to v2.2.56) contains an SQL injection via the AJAX action b1_run_query without capability checks. An authenticated user, even with minimal rights (subscriber), can execute arbitrary SQL queries on the WordPress database, potentially compromising its integrity or exfiltrating data. CVE: CVE-2025-6718, CVSS 8.8.

Bearsthemes
Alone – Charity Multipurpose Theme (WordPress) – Two critical vulnerabilities affect this Alone theme (up to v7.8.3):
Bears Backup (WordPress) – The Bears Backup plugin (up to v2.0.0), often used with the Alone theme, is vulnerable to unauthenticated remote code execution. The bbackup_ajax_handle() function performs no permission check and directly calls call_user_func() with user-supplied data. An attacker can thereby execute arbitrary PHP code on the server. CVE: CVE-2025-5396, CVSS 9.8. Note: On a WordPress site using Alone ≤7.8.4, an attacker could first exploit CVE-2025-5394 to install the Bears Backup plugin, then exploit this RCE — a particularly dangerous exploit chain.

BossSoft
CRM 6.0 – An SQL injection vulnerability was discovered in BossSoft CRM v6.0, via the cstid parameter in the page HNDCBas_customPrmSearchDtl.jsp. CVE: CVE-2025-7801, CVSS 7.3. The attack is remotely executable, and the exploit has reportedly been publicly released, increasing the risk of untargeted exploitation by general malicious actors.

Campcodes
Online Movie Theater Seat Reservation System 1.0 – SQL injection vulnerability in manage_seat.php via the ID parameter. CVE: CVE-2025-7838, CVSS 7.3. Exploitation does not require authentication and the exploit is also publicly disclosed, meaning an attack can be easily automated by anyone.

chainguard-dev
apko (OCI image build tool) – In apko (v0.27.0 to 0.29.4), a permissions bug set critical files to mode 0666 (read/write for everyone). This could be abused for privilege escalation (notably on Linux, where any user could modify these files). CVE: CVE-2025-53945, CVSS 7.0. Note: version 0.29.5 fixes the issue.

Cisco
Identity Services Engine (ISE) & ISE-PIC – A critical vulnerability allows an unauthenticated remote attacker to execute arbitrary code as root on the Cisco ISE appliance. No authentication is required — just a specially crafted API request that exploits insufficient user input validation. CVSS impact: maximum 10.0 (CVE-2025-20337). In other words, an Internet-based attacker could obtain a root shell on the ISE server with no credentials — an extremely serious threat to network security.

CMSJunkie
WP-BusinessDirectory (WordPress) – This business directory plugin (up to v3.1.3) suffers from a blind SQL injection. CVE: CVE-2025-24759, CVSS 9.3. An attacker can inject malicious parameters into SQL queries, potentially exfiltrating or altering data in the WordPress database, without directly seeing the result (hence “blind” SQLi).

cmsMinds
Pay with Contact Form 7 (WordPress) – Cross-Site Scripting (XSS) vulnerability in this payment form plugin (up to v1.0.4). It’s a reflected XSS due to improper input sanitization. CVE: CVE-2025-52777, CVSS 7.1. An attacker can trick an admin into clicking a malicious link to execute a script in their browser context (potentially hijacking their admin session).

code-projects (web script provider)
Several open-source web applications from code-projects (mostly version 1.0) present critical SQL injection vulnerabilities. What is particularly concerning is the recurrence of this same type of flaw across different projects, often accompanied by publicly available exploits. Affected modules include:

  • AVL Rooms – Two SQL injections: one via first_name on profile.php, the other via city on city.php. CVEs: CVE-2025-7605, CVE-2025-7606, CVSS 7.3 each.
  • Church Donation System – No fewer than eight SQL injections have been reported in this donation system (pages login.php, reg.php, members/Tithes.php, members/offering.php, members/giving.php, members/update_password_admin.php, members/login_admin.php, members/search.php). Each one is critical (CVSS 7.3, e.g., CVE-2025-7829 to CVE-2025-7833, CVE-2025-7859 to CVE-2025-7861). All allow SQL injection through various parameters (Username, mobile, trcode, Amount, etc.), potentially exfiltrating or modifying the database. Worryingly, public exploits exist for all of them.
  • Electricity Billing System – SQL injection via new_password on user/change_password.php. CVE: CVE-2025-7610, CVSS 7.3.
  • Food Ordering Review System – SQL injection via fname on pages/signup_function.php. CVE: CVE-2025-7814, CVSS 7.3.
  • Job Diary – Three critical SQL injections via the ID parameter on view-all.php, view-emp.php, and view-cad.php (CVE-2025-7593, 7594, 7595). CVSS 7.3.
  • Mobile Shop – SQL injection via email on login.php. CVE: CVE-2025-7612, CVSS 7.3.
  • Online Appointment Booking System – Eight SQL injections spread across various admin pages:
    • cover.php – parameters uname/psw
    • admin/getmanagerregion.php – param city
    • admin/adddoctorclinic.php – param clinic
    • admin/addclinic.php – param cid
    • admin/deletedoctor.php – param did
    • admin/adddoctor.php – param Username
    • admin/deletedoctorclinic.php – param clinic
    • admin/addmanagerclinic.php – param clinic
      CVEs: CVE-2025-7587, CVE-2025-7749 to 7753, CVE-2025-7764, 7765. All rated CVSS 7.3. Each can be used to bypass authentication and directly perform actions on the database (e.g., add a malicious doctor). Again, public exploits are available.
  • Simple Shopping Cart – Three SQL injections:
    • Customers/save_order.php (parameter order_price) – CVE-2025-7607
    • userlogin.php (parameter user_email) – CVE-2025-7608
    • register.php (parameter ruser_email) – CVE-2025-7609
      All rated CVSS 7.3.
  • Wedding Reservation – SQL injection via lu in global.php. CVE: CVE-2025-7611, CVSS 7.3.

In summary, most of these code-projects applications suffer from the same flaw: lack of input filtering/escaping, leading to widespread SQL injection vulnerabilities. All these exploits are publicly known, which means that bots or opportunistic attackers could easily target these applications if they are exposed online. I strongly recommend a general audit of these applications and the urgent implementation of patches or protective measures (e.g., a WAF).

Codexpert, Inc
CoSchool LMS (WordPress) – An insecure deserialization vulnerability was discovered in CoSchool LMS (up to v1.4.3), leading to PHP object injection. CVE: CVE-2025-30973, CVSS 9.8. An attacker could execute code during the deserialization process via a specially crafted payload. Potentially critical impact (RCE).

crmperks
Integration for Google Sheets & Contact Form plugins (WordPress) – This integration plugin (up to v1.1.1) is vulnerable to PHP object injection through insecure data deserialization. CVE: CVE-2025-7697, CVSS 9.8. An unauthenticated attacker can inject a malicious PHP object. Note: when combined with the presence of the Contact Form 7 plugin (very common), which provides a gadget chain, it could lead to deletion of arbitrary files (e.g., wp-config.php), resulting in denial of service or RCE (WordPress reinstalling in a compromised state).
Integration for Pipedrive & Contact Form plugins (WordPress) – Similar PHP injection vulnerability (insecure deserialization) in this plugin (v<=1.2.3). CVE: CVE-2025-7696, CVSS 9.8. The context and impact are analogous: deletion of critical files through a deserialization vector, potentially leading to site takeover.

CrushFTP
CrushFTP server (versions 10.x < 10.8.5 and 11.x < 11.3.4_23) – A flaw in AS2 validation (when the DMZ proxy feature is not used) allows a remote attacker to gain admin access via HTTPS. In practice, the attacker bypasses admin authentication and can fully manage the FTP server. CVE: CVE-2025-54309, CVSS 9.0. Notably, this vulnerability was actively exploited in the wild in July 2025. I emphasize: if you’re using CrushFTP, update immediately to 10.8.5+ or 11.3.4_23+ to patch this already-exploited vulnerability.

D-Link
Multiple D-Link routers (older DI-8100 and DIR-513 models) are affected by buffer overflows:

D-Link DI-8100 – Six critical buffer overflow vulnerabilities were found in version 16.07.26A1 (and possibly 1.0 for some).
D-Link DIR-513 – Two critical buffer overflows reported in this old router (versions 1.0 and 1.10).
(Note: These vulnerable D-Link devices are old and likely no longer maintained. It is imperative to isolate or replace them, as public exploits already exist and no patches will be issued.)

danielriera
Counter live visitors for WooCommerce (WordPress) – The plugin (v<=1.3.6) has an arbitrary file deletion vulnerability via the wcvisitor_get_block function, which does not properly validate the file path. An unauthenticated attacker can target any directory and delete all its files. CVE: CVE-2025-7359, CVSS 8.2. This could lead to massive data loss or denial of service (e.g., by wiping a critical site directory).

dasinfomedia
School Management System (WordPress) – This plugin (<= v93.1.0) has a Local File Inclusion (LFI) vulnerability via the “page” parameter. An authenticated user with subscriber level or higher can include and execute any file on the server. CVE: CVE-2025-3740, CVSS 8.8. Consequence: if the attacker can upload an image or a seemingly “harmless” file somewhere, they can include it to execute arbitrary PHP (RCE). Note: in a multisite WordPress context, this flaw could even allow a subscriber to reset a super-admin password by including the relevant admin view – a major privilege escalation. The fix was released in version 1.93.1 (July 2, 2025). Updating this plugin as soon as possible is strongly recommended.

Dassault Systèmes
SOLIDWORKS eDrawings – Several critical memory corruption vulnerabilities have been patched in eDrawings 2025 (CAD viewer software).

designthemes
Three WordPress themes from the vendor designthemes were identified with flaws:

  • Invico – Consulting Business Theme – Reflected XSS vulnerability (CVE-2025-31427, CVSS 7.1). Poorly filtered input allows script injection.
  • Ofiz – Business Consulting Theme – Similar reflected XSS (CVE-2025-31072, CVSS 7.1).
  • Visual Art – Gallery Theme – Insecure deserialization leading to object injection (CVE-2025-31422, CVSS 8.8).
    In all cases, exploitation occurs via the theme’s web interface. It is recommended to check for available patches or updates, given the severity.

Dokploy
Dokploy (self-hosted PaaS) – An unauthenticated remote code execution vulnerability was found in the preview deployment feature of Dokploy (before v0.24.3). An attacker could simply open a pull request on a public repository linked to Dokploy to execute arbitrary code and access sensitive environment variables. CVE: CVE-2025-53825, CVSS 9.4. This flaw potentially exposed the secrets of many Dokploy users. As an immediate measure, version 0.24.3 patched the issue. I strongly insist on updating Dokploy if you use it, as the trivially exploitable nature of this vulnerability makes it a critical entry point for attackers on your private cloud deployments.

DSIC (Digitware System Integration Corp)
Official Document Creation Component (cross-browser) – This DSIC ActiveX/COM component contains a remote code execution vulnerability. If a user visits a malicious website while the component is active, the attacker can force the system to download and execute an arbitrary program. CVE: CVE-2025-7620, CVSS 8.8. In plain terms, this is a drive-by download vulnerability. Ensure this component is not active on systems browsing the Internet, or deploy a patch if available, as this could be a massive infection vector.

ELEXtensions
ELEX WooCommerce Advanced Bulk Edit – SQL injection vulnerability (CVE-2025-47645, CVSS 8.5) in this bulk editing plugin for WooCommerce (v≤1.4.9). An attacker can inject SQL commands through unsanitized parameters. This could compromise the e-commerce database (e.g., exfiltrate customer data, alter prices). I recommend filtering all input and updating to a patched version if available.

Eluktronics
Control Center (PC software) – A critical vulnerability in Eluktronics Control Center 5.23.51.41 (a laptop overclocking/config tool) allows command injection via an insecure PowerShell script. The attack requires local access (i.e., the attacker already has code execution rights on the machine). The vulnerable vector is a poorly protected script in AiStoneService/MyControlCenter/Command. CVE: CVE-2025-7883, CVSS 7.8. Note: The researcher reported no vendor response, suggesting no patch is available. The details were publicly disclosed. If you’re using Eluktronics, avoid running this tool on untrusted accounts and monitor for unofficial fixes or mitigations (e.g., delete/rename the vulnerable script).

Emby
Emby Server (Windows) – Two critical vulnerabilities:

emlog
Emlog (open-source CMS/blog) – Up to version pro-2.5.17, Emlog has a Cross-site Scripting (XSS) flaw via the keyword parameter, which is not sanitized. A remote attacker can inject HTML/JS into this parameter. If an admin clicks a malicious link or visits a search page with the malicious keyword, code will execute in their browser. CVE: CVE-2025-53923, CVSS 8.2. No fix was available at the time of disclosure. In other words, Emlog users should be extremely cautious with external links and consider server-side filtering of the keyword parameter or disabling this feature until a patch is released.

eoxia
WPshop 2 – E-Commerce (WordPress) – Arbitrary file upload vulnerability in WPshop 2 (< v1.3.9.6) via the ajaxUpload function, which doesn’t validate file types. An unauthenticated attacker can upload any file to the server (e.g., a disguised PHP script), potentially leading to code execution. CVE: CVE-2015-10135, CVSS 9.8. (Despite the CVE-2015 prefix, this vulnerability was published in 2025, likely a CVE assignment anomaly). Recommendation: update to version 1.3.9.6 or later, or manually patch to block unauthorized file uploads.

expressjs
Multer (Node.js middleware) – Multer versions 1.4.4-lts.1 through 2.0.1 have a flaw allowing denial of service (DoS) via a malformed multipart upload request. An attacker can send a specially crafted request causing an unhandled exception, crashing the Node process. CVE: CVE-2025-7338, CVSS 7.5. No workaround exists other than upgrading to v2.0.2 where the bug is fixed. Developers using Multer should upgrade immediately or implement checks on upload size/structure.

EZiHosting
Tennis Court Bookings (plugin) – Reflected XSS vulnerability (CVE-2025-52787, CVSS 7.1) in this tennis court booking plugin (v≤1.2.7). Unsanitized input could lead to malicious script execution in a victim’s browser. Impact: potential session theft, etc. Given the limited scope (specific plugin), this flaw should still be patched if the plugin is publicly exposed.

Fortinet
FortiWeb (web application firewall) – Vulnerable versions: 7.6.0 to 7.6.3, 7.4.0 to 7.4.7, 7.2.0 to 7.2.10, and <7.0.10. An unauthenticated SQL injection vulnerability has been identified. By sending specially crafted HTTP/HTTPS requests, a remote attacker can execute arbitrary SQL commands on FortiWeb’s database. CVE: CVE-2025-25257, CVSS 9.6. Given Fortinet’s critical role in perimeter defense, this must be patched urgently – apply the vendor’s fix or restrict management access in the meantime.

FunnelKit
Funnel Builder (WordPress) – SQL injection vulnerability (CVE-2025-49034, CVSS 7.6) in FunnelKit Funnel Builder (up to v3.10.2). An attacker can exploit unsanitized input to alter SQL queries. Risk: theft or corruption of data in WordPress. Though rated CVSS 7.6, I consider any SQL injection on an e-commerce site high risk (e.g., customer data exfiltration). Update FunnelKit to a patched version immediately.

FWDesign
Easy Video Player for WP & WooCommerce – Path Traversal vulnerability in this plugin (v≤10.0). An attacker can access files outside the intended directory using manipulated paths (../). CVE: CVE-2025-28955, CVSS 7.5. This could expose sensitive server files (e.g., configs) or even overwrite files (if combined with write access). Often exploitable for privilege escalation (e.g., read wp-config.php with database credentials). Patch promptly.

Grafana
Grafana OSS – An open redirect vulnerability was introduced in Grafana v11.5.0, which can be chained with a path traversal to achieve XSS. An attacker can redirect a victim’s browser to a URL containing malicious code. Fixed versions: 12.0.2+security-01, 11.6.3+security-01, 11.5.6+security-01, 11.4.6+security-01, 11.3.8+security-01. CVE: CVE-2025-6023, CVSS 7.6. Having personally deployed Grafana, I note this flaw as open redirects may seem minor, but when chained with other bugs, they become a potent XSS vector. Update Grafana immediately.

GT3themes
ListingEasy (WordPress) – XSS flaw in the ListingEasy theme (≤ v1.9.2). A poorly sanitized parameter enables reflected XSS. CVE: CVE-2025-30955, CVSS 7.1. Moderate impact: an attacker could trick an admin/user into clicking a malicious link to steal session cookies, for example. Theme update is necessary.

Guru Team
Site Chat on Telegram (WordPress) – Untrusted deserialization vulnerability leading to PHP object injection in this chat plugin (≤ v1.0.4). CVE: CVE-2025-30949, CVSS 9.8. An attacker can send a malicious payload (likely via a plugin field or API) and execute PHP code during deserialization. High severity: full site takeover possible without authentication. Patch urgently.

harry0703
MoneyPrinterTurbo – In this application (≤ v1.2.6), a critical flaw exists in the API (app/controllers/base.py, function verify_token): no authentication check on a sensitive endpoint. A remote attacker could directly call the API to perform actions without a valid token. CVE: CVE-2025-7897, CVSS 7.3. In other words, the app fails to properly verify tokens, making it vulnerable to full unauthorized use. A patch should be released urgently due to the simplicity of exploitation.

Hewlett Packard Enterprise (HPE)
Telco Service Orchestrator – A vulnerability allows an authenticated client to perform an SQL injection via service requests. CVE: CVE-2025-37104, CVSS 7.1. An internal attacker (with legitimate access) could use this to extract database type or other details. Lower risk than an external attack, but it could be used post-compromise by an attacker who hijacked a user account.

AutoPass License Server (APLS) – Three critical vulnerabilities (version < 9.18):

Hgiga
iSherlock (maillog 4.5) – An unauthenticated OS command injection vulnerability allows an attacker to execute arbitrary system commands on the server running iSherlock. CVE: CVE-2025-7451, CVSS 9.8. This vulnerability is actively being exploited in the wild. Immediate action is required: update or disconnect the service, as attacks are ongoing. (The advisory clearly states: “Already exploited, update immediately.”)

HT Plugins

The HT Contact Form Widget plugin (Elementor & Gutenberg) for WordPress (≤ v2.2.1) has three critical vulnerabilities exploited via its temporary file handling features:

  • Arbitrary file upload – No file type validation in temp_file_upload. An unauthenticated attacker can upload a malicious file to the server (e.g., PHP webshell), leading to RCE.
    CVE: CVE-2025-7340, CVSS: 9.8.
  • Arbitrary file deletion – Path insufficiently validated in temp_file_delete(). An attacker can delete any file by knowing its path. Deleting wp-config.php or a critical system file usually leads to full site compromise (e.g., forced WordPress reconfiguration → RCE).
    CVE: CVE-2025-7341, CVSS: 9.1.
  • Arbitrary file move – Lack of validation in handle_files_upload(). Allows moving files anywhere on the server. Moving wp-config.php out of place may cause similar RCE.
    CVE: CVE-2025-7360, CVSS: 9.1.

Note: The combination of these three flaws makes a WordPress site extremely vulnerable. An unauthenticated attacker could upload a backdoor and then cover their tracks by deleting or relocating files. Exploitation of all three vulnerabilities together has already been observed in the wild. Immediate update or removal of the plugin is strongly advised.

IBM

WebSphere Application Server / Liberty – Versions WAS 9.0 and Liberty 17.0.0.3 to 25.0.0.7 are vulnerable to stack overflow–based denial of service. An attacker can send a crafted request to consume all server memory and crash the application.
CVE: CVE-2025-36097, CVSS: 7.5.

ImageMagick

Two vulnerabilities affect ImageMagick:

  • Infinite loop during XMP conversion – A malicious XMP file causes endless write loops, resulting in a DoS (resource exhaustion).
    Affected: Versions < 7.1.2-0.
    CVE: CVE-2025-53015, CVSS: 7.5.
  • Buffer overflow via file name formatting – Using multiple %d specifiers in filenames passed to magick mogrify leads to a stack overflow via vsnprintf, potentially resulting in arbitrary code execution.
    Affected: Versions < 7.1.2-0 and < 6.9.13-26.
    CVE: CVE-2025-53101, CVSS: 7.4.

Update ImageMagick to the latest version, especially if processing user-supplied images.

Infility

Infility Global – Reflected XSS vulnerability in version ≤ 2.13.4.
CVE: CVE-2025-47652, CVSS: 7.1.
Allows code injection via unsanitized web input, enabling attackers to steal cookies, etc.

ISC

BIND 9 (EDNS Client Subnet) – Versions 9.11.3-S1 to 9.16.50-S1, 9.18.11-S1 to 9.18.37-S1, and 9.20.9-S1 to 9.20.10-S1 are vulnerable to DNS cache poisoning when ECS is enabled.
CVE: CVE-2025-40776, CVSS: 8.6.

BIND 9 (serve-stale) – If serve-stale is enabled with stale-answer-client-timeout = 0, a specific CNAME chain causes an assertion failure.
CVE: CVE-2025-40777, CVSS: 7.5.

🛠 Update BIND to prevent DNS crashes or redirection.

JetBrains

YouTrack – In versions < 2025.2.86069 (and 2024.3.85077, 2025.1.86199), admin API access allowed email spoofing.
CVE: CVE-2025-53959, CVSS: 7.6.
Patched in version 2025.2.86069.

jetmonsters

JetFormBuilder (WordPress) – Untrusted deserialization leads to PHP object injection in versions ≤ 3.5.1.2.
CVE: CVE-2025-53990, CVSS: 7.2.

Jinher

OA (Office Collaboration Software) – Two XXE (XML External Entity) vulnerabilities were discovered. (CVE details not provided in the original text.)

josxha

Restrict File Access (WordPress) – CSRF vulnerability allows arbitrary file deletion (≤ v1.1.2) via a config page lacking nonce protection.
CVE: CVE-2025-7667, CVSS: 8.1.

karimmughal

Dot html, php, xml etc pages (WordPress) – Reflected XSS vulnerability (≤ v1.0).
CVE: CVE-2025-52779, CVSS: 7.1.

Kingdom Creation

Media Folder (WordPress) – Reflected XSS vulnerability (≤ v1.0.0).
CVE: CVE-2025-52786, CVSS: 7.1.

📝 Many small WordPress plugins share this pattern of basic XSS flaws (~CVSS 7.1). While not as severe as RCEs, they can be used to compromise admin sessions (via cookie theft). Review and update all installed plugins regularly.

LambertGroup

HTML5 Radio Player (WPBakery addon) – Path Traversal vulnerability (≤ v2.5).
CVE: CVE-2025-31070, CVSS: 7.5.
Exploitable to access sensitive files like wp-config.php.

LB-LINK

  • Routers (BL-AC1900 / AC2100_AZ3 / AC3600 / AX1800 / AX5400P / WR9000) – Insecure authentication via lighttpd.cgi (firmware ≤ 20250702).
    CVE: CVE-2025-7574, CVSS: 9.8.
  • BL-AC3600 (v1.0.22) – Hardcoded credentials (root:blinkadmin) found in /etc/shadow.
    CVE: CVE-2025-7564, CVSS: 7.8.

No patch available. These routers pose a major security risk and should be isolated or replaced.

Lenovo

  • Lenovo Browser – XSS vulnerability exploitable by malicious websites.
    CVE: CVE-2025-6248, CVSS: 7.4.
  • Elliptic Labs Virtual Lock Sensor (ThinkPad P1 Gen6) – Improper permissions allow local privilege escalation.
    CVE: CVE-2025-0886, CVSS: 7.8.
  • Lenovo Vantage – Two vulnerabilities allow local attackers to gain elevated privileges by modifying config files or registry keys.
    CVEs: CVE-2025-6231, CVE-2025-6232, CVSS: 7.8.

Leviton

AcquiSuite & Energy Monitoring Hub – Stored XSS vulnerability via URL parameters.
CVE: CVE-2025-6185, CVSS: 9.3.
High-severity XSS that could allow control of the admin interface. Update firmware urgently.

LoginPress

LoginPress Pro (WordPress)Authentication bypass via social login token.
CVE: CVE-2025-7444, CVSS: 9.8.
Knowing only an admin’s email, an attacker could log in as them via OAuth. Update or disable this plugin immediately.

Logpoint

Logpoint SIEM (< v7.6.0) – Operator-level user can exploit path traversal in layout templates to achieve RCE.
CVE: CVE-2025-54317, CVSS: 8.4.

lynton_reed

Work The Flow File Upload (WordPress) – Includes outdated jQuery-File-Upload v9.5.0, enabling arbitrary file upload.
CVE: CVE-2015-10138, CVSS: 9.8.
This old vulnerability still present suggests the plugin is unmaintained. Urgent patch or removal required.

mailcow
Mailcow: dockerized – Versions prior to 2025-07 of this open-source mail suite contain a Server-Side Template Injection (SSTI) vulnerability in the quota notification system. A mailcow administrator could configure a malicious notification template to execute code on the server when rendering the template (template expression injection). CVE: CVE-2025-53909, CVSS 9.1. This flaw requires admin access to the interface, so it’s more of an internal threat or post-compromise scenario. However, an attacker who has compromised the admin interface could exploit it to gain direct access to the mail server. Version 2025-07 fixes the issue.

malcure
Malcure Malware Scanner (WordPress)Arbitrary file deletion vulnerability (authenticated) in this security plugin (≤ v16.8). The wpmr_delete_file() function does not check capabilities: thus, a low-privileged subscriber user can delete arbitrary files. CVE: CVE-2025-6043, CVSS 8.1. File deletion can lead to RCE (e.g., deleting wp-config.php) but only if the site is in “advanced” mode. Note: the vulnerability requires authentication (even if low-privileged), which slightly lowers the likelihood, but still—seeing a malware scanner introduce a critical flaw is quite ironic. Update it quickly.

MangaBooth
Madara – Core (WordPress)Unauthenticated arbitrary file deletion vulnerability in this manga management plugin (≤ v2.2.3). The wp_manga_delete_zip() function does not sufficiently validate the file path, allowing deletion of any file. CVE: CVE-2025-7712, CVSS 9.1. Deleting files like wp-config.php → potential RCE by reinstalling WordPress or modifying the configuration. This very specific plugin needs to be updated to patch this flaw.

markjaquith
Subscribe to Comments (WordPress) – This plugin (≤ v2.1.2) suffers from a Local File Inclusion (LFI) via the Path HTTP header. An authenticated administrator can include and execute arbitrary PHP files on the server. CVE: CVE-2015-10133, CVSS 7.2. This vulnerability requires admin privileges, so it’s more of a local privilege escalation (e.g., a malicious admin can abuse the application – limited case). However, when combined with other vulnerabilities that give an attacker admin access, it could be used for persistence. It should be patched anyway.

Mbed (Arm)
Mbed TLS (< 3.6.4) – A use-after-free has been discovered in the mbedtls_x509_string_to_names() function of the TLS library. It frees a pointer passed as a parameter, although the documentation does not suggest so, meaning the calling application retains pointers to already freed memory. CVE: CVE-2025-47917, CVSS 8.9. In short, a program using Mbed TLS as per the documentation could crash or even suffer arbitrary code execution if an attacker exploits this behavior (e.g., with a malformed certificate containing multiple DNs in the SAN). Two example utilities (cert_write and cert_req) are explicitly mentioned as affected. Developers using Mbed TLS should upgrade to version 3.6.4 or higher and recompile their applications.

Md. Yeasin Ul Haider
The URL Shortener script (WordPress URL shortener) version ≤ 3.0.7 has three critical vulnerabilities:

SQL Injection – Failure to sanitize certain fields allows SQL injection (CVE: CVE-2025-28959, CVSS 9.3).
Untrusted deserialization (Object Injection) – Allows code execution via injected PHP objects (CVE: CVE-2025-28961, CVSS 9.8).
Missing authentication (access control) – Certain functions can be called without rights verification, allowing unauthorized users to access restricted features (CVE: CVE-2025-28965, CVSS 8.6).
These three vulnerabilities combined make the plugin extremely dangerous to expose. The untrusted deserialization (9.8) in particular means that an unauthenticated attacker could execute PHP and take over the site. This plugin must be disabled or patched immediately.

Metagauss
ProfileGrid (WordPress)SQL Injection vulnerability (CVE: CVE-2025-49876, CVSS 8.5) in ProfileGrid (≤ v5.9.5.2). Impact: an attacker could exfiltrate/modify profile or other data by exploiting this bug. An update is required as CVSS 8.5 implies either an unauthenticated vector or highly impactful outcome.

Metasoft
MetaCRM (Chinese edition) – Up to v6.4.2, this CRM solution contains an insufficient authentication flaw on the /debug.jsp page. A remote attacker can access this critical debug page without authentication and potentially perform privileged actions. CVE: CVE-2025-7875, CVSS 7.3. The exploit is public and the vendor has not responded. This is similar to the LB-LINK case: no patch in sight. If you use MetaCRM, I recommend strictly restricting its network access (VPN) or applying your own compensating measures (e.g., delete debug.jsp if not needed).

Microsoft (Cloud et Entreprise)

Azure DevOps – A privilege escalation vulnerability has been fixed (CVE-2025-47158, CVSS 9.0). It stems from a flawed assumption about the immutability of certain data, allowing an unauthorized attacker to escalate privileges over the network. Microsoft has not provided many details in the public CVE, but one can imagine a vector such as manipulation of a JWT or an unverified configuration parameter.

Azure Machine Learning – Two critical vulnerabilities, both allowing an already authenticated attacker on the service to escalate their privileges within the ML environment. One is due to improper authorization handling (CVE-2025-49746, CVSS 9.9) and the other due to lack of authorization checks (CVE-2025-49747, CVSS 9.9). In essence, an Azure ML user with limited rights could become administrator of the ML service or perform unauthorized actions. Microsoft likely deployed patches on the server side given the near-maximum score.

Microsoft Purview – An overly permissive allowlist issue allows an authenticated attacker to escalate privileges (CVE-2025-53762, CVSS 8.7). Purview is a data governance solution; a malicious user could access normally restricted data or actions. A patch was likely applied by Microsoft.

SharePoint Enterprise Server 2016 – An insecure deserialization vulnerability in the on-premises versions of SharePoint 2016 allows an unauthenticated attacker to execute remote code on the server. CVE: CVE-2025-53770, CVSS 9.8. Microsoft has stated it is aware of an exploit in the wild for this flaw. No patch was immediately available as of July 20, but mitigations were published in the meantime. As a security officer, this is a critical issue: the published workarounds (usually disabling the vulnerable feature via PowerShell) should be applied until the full patch is deployed. Since SharePoint is often exposed on the intranet, this vulnerability can be exploited by an internal actor or one pivoting within the network.

Conclusion

I’m sharing with you, as a cybersecurity expert, the analysis of this weekly CISA bulletin dated July 14, 2025, which reveals a large number of critical vulnerabilities affecting various domains: WordPress plugins, network equipment, enterprise software, cloud solutions, etc. Several key trends emerge:

• Numerous WordPress plugin and theme vulnerabilities related to upload features, file deletion, or SQL/XSS injections. This highlights the importance for web administrators to keep their extensions updated and limit the use of non-essential or untrusted plugins. For CERT teams, a specific watch on popular WP plugins is necessary, as they are a prime target and often massively exploited once exploits are released.

• Outdated network/IoT equipment (D-Link, LB-LINK, Zyxel, etc.) suffering from buffer overflows, backdoors, or authentication bypasses. Many of these products are no longer supported by vendors, meaning no fixes are available. The obvious recommendation is to retire or isolate them from the network. For instance, legacy D-Link and LB-LINK routers should no longer be used in production environments.

• Critical vulnerabilities in enterprise and cloud solutions (Cisco ISE, HPE, Microsoft Azure/SharePoint, Logpoint). These generally received quick patches from vendors. However, the fact that some exploits are already in the wild (e.g., SharePoint, CrushFTP, iSherlock) is alarming. SOC teams must ensure immediate patching of these systems and monitor for any signs of exploitation (suspicious access logs, known IoCs).

• Vulnerabilities in software commonly used by end users (Lenovo Vantage, Motorola RSA, etc.) remind us that endpoint security is equally important. A local attacker or pre-installed malware can often exploit such vulnerabilities for further privilege escalation. This highlights the need for strong anti-malware protection, limited privilege policies, and timely software updates in workstation environments.

I chose to describe each vulnerability individually to highlight its nature and impact.

As a CISO or CERT analyst, I recommend prioritizing the following actions:

  1. Identify affected systems in your infrastructure (servers, applications, web plugins, network equipment). For each CVE listed, ask yourself: “Do we have this component in-house?”. An up-to-date inventory makes this task easier.
  2. Apply available patches without delay, starting with those already actively exploited (e.g., SharePoint CVE-2025-53770, iSherlock, CrushFTP, etc.) or those offering unauthenticated access to remote attackers (e.g., CVEs affecting Cisco ISE, FortiWeb, Zyxel…).
  3. Implement temporary mitigations if no patch is available: disable the vulnerable feature, restrict access (firewall, VPN), increase log monitoring to detect exploitation. For example, for SharePoint 2016 CVE-2025-53770, Microsoft has provided mitigations to apply immediately while waiting for the patch. Likewise, for unpatched routers, network segmentation and strict filtering are necessary.
  4. Monitor public exploits – Many of the vulnerabilities mentioned have publicly available proof-of-concepts or are already integrated into common attack tools. Expect these flaws to be quickly exploited opportunistically (especially SQL injections on CMSs, RCEs on routers/IoT, and critical WordPress flaws). Adjust your detection rules accordingly (IDS/IPS, SIEM use-cases).

In conclusion, the week of July 14, 2025, clearly illustrates the diversity of current threats: from basic XSS to unauthenticated RCE on network appliances, no layer is spared. My advice is to stay proactive: don’t wait for a vulnerability to be exploited in your environment before taking action. Stay informed via CISA bulletins (or equivalents) every week, and integrate this intelligence into your vulnerability management process.

Cybersecurity is a continuous effort, and responsiveness to such alerts is key to effectively protecting our infrastructure and data.

Thanks to CISA for their precise work.

Enjoy!

Source: https://www.cisa.gov/news-events/bulletins/sb25-202