Article Details
Scrape Timestamp (UTC): 2025-11-05 06:12:35.617
Source: https://thehackernews.com/2025/11/cisa-adds-gladinet-and-cwp-flaws-to-kev.html
Original Article Text
Click to Toggle View
CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Gladinet and Control Web Panel (CWP) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabilities in question are listed below - The development comes weeks after cybersecurity company Huntress said it detected active exploitation attempts targeting CVE-2025-11371, with unknown threat actors leveraging the flaw to run reconnaissance commands (e.g., ipconfig /all) passed in the form of a Base64-encoded payload. However, there are currently no public reports on how CVE-2025-48703 is being weaponized in real-world attacks. However, technical details of the flaw were shared by security researcher Maxime Rinaudo in June 2025, shortly after it was patched in version 0.9.8.1205 following responsible disclosure on May 13. "It allows a remote attacker who knows a valid username on a CWP instance to execute pre-authenticated arbitrary commands on the server," Rinaudo said. In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies are required to apply the necessary fixes by November 25, 2025, to secure their networks. The addition of the two flaws to the KEV catalog follows reports from Wordfence about the exploitation of critical security vulnerabilities impacting three WordPress plugins and themes - WordPress site users relying on the aforementioned plugins and themes are recommended to update them to the latest version as soon as possible, use strong passwords, and audit the sites for signs of malware or the presence of unexpected accounts.
Daily Brief Summary
CISA has added vulnerabilities in Gladinet and Control Web Panel (CWP) to its Known Exploited Vulnerabilities catalog, citing active exploitation evidence.
Huntress detected exploitation attempts on CVE-2025-11371, with attackers using Base64-encoded payloads for reconnaissance commands like ipconfig /all.
CVE-2025-48703 allows remote attackers to execute pre-authenticated arbitrary commands if they know a valid username on a CWP instance.
Federal Civilian Executive Branch agencies must implement necessary patches by November 25, 2025, to protect their networks from these vulnerabilities.
The vulnerabilities' inclusion in the KEV catalog follows similar reports of critical flaws in WordPress plugins and themes, urging users to update and secure their sites.
Organizations are advised to update affected software immediately, strengthen password policies, and conduct thorough audits for signs of compromise.
The proactive measures by CISA aim to mitigate risks and enhance the security posture of federal and private sector networks.