Article Details
Scrape Timestamp (UTC): 2025-11-15 16:42:40.296
Source: https://thehackernews.com/2025/11/rondodox-exploits-unpatched-xwiki.html
Original Article Text
Click to Toggle View
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet. The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against a critical security flaw that could allow attackers to achieve arbitrary code execution. The vulnerability in question is CVE-2025-24893 (CVSS score: 9.8), an eval injection bug that could allow any guest user to perform arbitrary remote code execution through a request to the "/bin/get/Main/SolrSearch" endpoint. It was patched by the maintainers in XWiki 15.10.11, 16.4.1, and 16.5.0RC1 in late February 2025. While there was evidence that the shortcoming had been exploited in the wild since at least March, it wasn't until late October, when VulnCheck disclosed it had observed fresh attempts weaponizing the flaw as part of a two-stage attack chain to deploy a cryptocurrency miner. Subsequently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to apply necessary mitigations by November 20. In a fresh report published Friday, VulnCheck revealed that it has since observed a spike in exploitation attempts, hitting a new high on November 7, followed by another surge on November 11. This indicates broader scanning activity likely driven by multiple threat actors participating in the effort. This includes RondoDox, a botnet that's rapidly adding new exploitation vectors to rope susceptible devices into a botnet for conducting distributed denial-of-service (DDoS) attacks using HTTP, UDP, and TCP protocols. The first RondoDox exploit was observed on November 3, 2025, per the cybersecurity company. Other attacks have been observed exploiting the flaw to deliver cryptocurrency miners, as well as attempts to establish a reverse shell and general probing activity using a Nuclei template for CVE-2025-24893. The findings once again illustrate the need for adopting robust patch management practices to ensure optimal protection. "CVE-2025-24893 is a familiar story: one attacker moves first, and many follow," VulnCheck's Jacob Baines said. "Within days of the initial exploitation, we saw botnets, miners, and opportunistic scanners all adopting the same vulnerability."
Daily Brief Summary
RondoDox botnet targets unpatched XWiki servers, exploiting CVE-2025-24893, a critical vulnerability allowing arbitrary code execution with a CVSS score of 9.8.
The vulnerability, an eval injection bug, facilitates remote code execution via the "/bin/get/Main/SolrSearch" endpoint, affecting systems not updated to XWiki versions 15.10.11, 16.4.1, and 16.5.0RC1.
VulnCheck observed increased exploitation attempts in November 2025, indicating widespread scanning activity by multiple threat actors.
CISA has included this vulnerability in its Known Exploited Vulnerabilities catalog, mandating federal agencies to implement mitigations by November 20, 2025.
RondoDox uses this flaw to expand its botnet, executing DDoS attacks through HTTP, UDP, and TCP protocols, while other actors deploy cryptocurrency miners and reverse shells.
The situation underscores the critical importance of timely patch management to prevent exploitation and maintain cybersecurity resilience.
The rapid adoption of the exploit by various threat actors highlights the need for proactive vulnerability management and monitoring practices.