October 2025 CVE Landscape: 32 High-Impact Vulnerabilities Demand Immediate Attention

October 2025 saw a significant escalation in vulnerability activity, with Recorded Future's Insikt Group® identifying 32 high-impact vulnerabilities, double the 16 identified in September's CVE report. Twenty-six of these vulnerabilities scored as Very Critical.

What security teams need to know:

Bottom line: Don't discount older CVEs. Prioritize based on observed exploitation activity, maintain continuous asset discovery (including legacy systems), and apply compensating controls when immediate remediation isn't possible.

Quick Reference: October 2025 Vulnerability Table

All 32 vulnerabilities below were actively exploited in October.

#
Vulnerability
Risk
Score
Affected Vendor/Product
Vulnerability Type/Component
Public PoC
1
CVE-2025-41244
99
Broadcom VMware Aria Operations and VMware Tools
CWE-267 (Privilege Defined With Unsafe Actions)
Yes
2
CVE-2025-24893
99
XWiki Platform

CWE-94 (Code Injection)

CWE-95 (Eval Injection)

Yes
3
CVE-2025-6204
99
Dassault Systèmes DELMIA Apriso
CWE-94 (Code Injection)
No
4
CVE-2025-6205
99
Dassault Systèmes DELMIA Apriso
CWE-862 (Missing Authorization)
No
5
CVE-2025-54236
99
Adobe Commerce and Magento
CWE-20 (Improper Input Validation)
No
6
CVE-2025-59287
99
Microsoft WSUS
CWE-502 (Deserialization of Untrusted Data)
Yes
7
CVE-2025-61932
99
Motex LANSCOPE Endpoint Manager
CWE-940 (Improper Verification of Source of a Communication Channel)
No
8
CVE-2022-48503
99
Apple (Multiple Products)
CWE-129 (Improper Validation of Array Index)
No
9
CVE-2025-2746
99
Kentico Xperience CMS
CWE-288 (Authentication Bypass Using an Alternate Path or Channel)
No
10
CVE-2025-2747
99
Kentico Xperience CMS
CWE-288 (Authentication Bypass Using an Alternate Path or Channel)
No
11
CVE-2025-33073
99
Microsoft Windows SMB
CWE-284 (Improper Access Control)
Yes
12
CVE-2025-61884
99
Oracle EBS

CWE-22 (Path Traversal)

CWE-287 (Improper Authentication)

CWE-444 (HTTP Request/Response Smuggling)

CWE-501 (Trust Boundary Violation)

CWE-918 (SSRF), CWE-93 (CRLF Injection)

Yes
13
CVE-2025-54253
99
AEM Forms
CWE-863 (Incorrect Authorization)
Yes
14
CVE-2025-47827
99
IGEL OS
CWE-347 (Improper Verification of Cryptographic Signature)
Yes
15
CVE-2025-24990
99
Microsoft Windows
CWE-822 (Untrusted Pointer Dereference)
Yes
16
CVE-2025-59230
99
Microsoft Windows
CWE-284 (Improper Access Control)
Yes
17
CVE-2016-7836
99
SKYSEA Client View
CWE-287 (Improper Authentication)
No
18
CVE-2021-43798
99
Grafana Labs Grafana
CWE-22 (Path Traversal)
Yes
19
CVE-2025-27915
99
Synacor Zimbra Collaboration Suite (ZCS)
CWE-79 (Cross-site Scripting)
No
20
CVE-2021-22555
99
Linux Kernel
CWE-787 (Out-of-bounds Write)
Yes
21
CVE-2010-3962
99
Microsoft Internet Explorer
CWE-416 (Use After Free)
Yes
22
CVE-2021-43226
99
Microsoft Windows
Insufficient Information
Yes
23
CVE-2013-3918
99
Microsoft Windows

CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)

CWE-787 (Out-of-bounds Write)

Yes
24
CVE-2011-3402
99
Microsoft Windows
Insufficient Information
No
25
CVE-2010-3765
99
Mozilla (Multiple Products)
CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
Yes
26
CVE-2025-61882
99
Oracle EBS
CWE-287 (Improper Authentication)
Yes
27
CVE-2014-6278
89
GNU Bash
CWE-78 (OS Command Injection)
Yes
28
CVE-2017-1000353
89
Jenkins
CWE-502 (Deserialization of Untrusted Data)
Yes
29
CVE-2015-7755
89
Juniper ScreenOS
CWE-287 (Improper Authentication)
Yes
30
CVE-2025-21043
89
Samsung Mobile Devices
CWE-787 (Out-of-bounds Write)
No
31
CVE-2025-4008
89
Smartbedded Meteobridge

CWE-306 (Missing Authentication for Critical Function)

CWE-77 (Command Injection)

No
32
CVE-2025-11371
89
Gladinet CentreStack and TrioFox
CWE-552 (Files or Directories Accessible to External Parties)
Yes

Table 1: List of vulnerabilities that were actively exploited in September based on Recorded Future data (Source: Recorded Future)

Vendors Most Affected

Most Common Weakness Types

Threat Actor Activity

CL0P ransomware group dominated October's threat landscape:

Priority Alert: Active Exploitation

These vulnerabilities are under active exploitation and require immediate attention.

CVE-2025-61882 | Oracle E-Business Suite

Risk Score: 99 (Very Critical) | CISA KEV: Added October 6, 2025

Why this matters: CL0P is actively exploiting this zero-day for data theft campaigns. The vulnerability enables unauthenticated remote code execution through Oracle's Concurrent Processing/BI Publisher integration.

Affected versions: Oracle EBS 12.2.3 through 12.2.14

Immediate actions:

Exposure: ~1,430 Oracle EBS instances visible on Shodan (US, China, Germany, India, UK)

CVE-2025-59287 | Microsoft WSUS

Risk Score: 99 (Very Critical) | Active exploitation confirmed October 24, 2025

Why this matters: Attackers are targeting publicly exposed WSUS instances to achieve remote code execution. Successful exploitation could compromise your entire update distribution infrastructure.

Affected versions: Windows Server 2012 through 2025, including Server 23H2

Immediate actions:

Exposure: ~25 WSUS hosts remain publicly exposed (per Huntress)

CVE-2025-59230 | Windows RasMan

Risk Score: 99 (Very Critical) | CISA KEV: Added October 14, 2025

Why this matters: This zero-day allows privilege escalation from low-privilege user to SYSTEM-level access. Attackers are chaining this with initial access techniques for full system compromise.

Affected versions: Windows 10 (1607, 1809, 21H2, 22H2), Windows 11 (22H2–25H2), Windows Server 2008–2025

Immediate actions:

Technical Deep Dive: Exploitation Analysis

Security practitioners and incident responders can get technical detailed analysis with the following information:

CL0P's Oracle E-Business Suite Campaign

On October 6, 2025, Mandiant's CTO issued an alert detailing CL0P's exploitation of CVE-2025-61882. The vulnerability stems from a chain of flaws that, when combined, enable unauthenticated remote code execution.

The exploitation chain:

Observed post-exploitation activity:

According to GTIG and Mandiant's analysis, the threat actor:

Related Insikt Group® analysis: TTP Instance: Oracle EBS Exploitation Prior to CL0P's Extortion Campaign

Microsoft WSUS Deserialization Attack (CVE-2025-59287)

HawkTrace's October 18 analysis revealed the root cause: unsafe deserialization in the WSUS API's EncryptionHelper.DecryptData() method.

Technical breakdown:

The vulnerability allows attackers to embed malicious serialized objects in SOAP messages sent to ClientWebService.asmx. The WSUS server:

Observed attack pattern (per Huntress):

Windows RasMan Privilege Escalation (CVE-2025-59230)

Cyberthint's analysis details how insufficient access validation in the RasMan service enables privilege escalation.

Attack chain scenario:

Adobe AEM Forms RCE (CVE-2025-54253)

Searchlight Cyber's July 29 disclosure revealed a pre-authentication Struts2 DevMode chain enabling unauthenticated OGNL execution.

Key details:

Exposure: ~418 AEM instances on Shodan (US, Australia, Germany, Canada, Ireland)

Remediation: Upgrade to AEM version 6.5.0-0108 or later

Gladinet CentreStack/Triofox LFI (CVE-2025-11371)

Huntress's October 15 report documented active exploitation of this local file inclusion vulnerability.

Why it's dangerous: When chained with CVE-2025-30406, attackers achieve RCE via ViewState deserialization.

Observed attack pattern:

Remediation: Upgrade to version 16.10.10408.56683+

Exposure: ~1,528 CentreStack instances on Shodan (US, China, Germany, UK, Singapore)

Detection & Remediation Resources

Nuclei Templates from Insikt Group®

Recorded Future customers can access Nuclei templates.

Note: All templates are designed for authorized environments only and do not modify system state.

Recorded Future Product Integrations

October 2025 Summary

October's vulnerability landscape reinforced critical lessons for security teams:

Legacy systems remain high-value targets. Five of the 14 RCE-enabling vulnerabilities are over a decade old. Attackers continue exploiting unpatched legacy systems and internet-facing applications.

Zero-days demand rapid response. CL0P's exploitation of CVE-2025-61882 within days of disclosure demonstrates the shrinking window between vulnerability publication and weaponization.

Authentication flaws dominate. CWE-287 (Improper Authentication) was the most common weakness type—a reminder that identity and access controls remain foundational security priorities.

Take Action

Ready to see how Recorded Future can help your team prioritize vulnerabilities, detect active exploitation, and reduce risk across your attack surface? Check out our demo center. Or, dive into more Insikt Group research.

About Insikt Group®:

Recorded Future’s Insikt Group® threat research team is comprised of analysts, linguists, and security researchers with deep government and industry experience.

Insikt Group® publishes threat intelligence to the Recorded Future analyst community in blog posts and analyst notes.