
Multiple critical cybersecurity vulnerabilities have been identified and are actively exploited, affecting a wide range of systems and devices. The Cybersecurity and Infrastructure Security Agency (CISA) has added the Citrix NetScaler ADC and Gateway vulnerability (CVE-2025-5777), known as 'Citrix Bleed 2,' to its Known Exploited Vulnerabilities catalog, confirming active exploitation targeting enterprises. Fortinet released a patch for a critical unauthenticated SQL injection flaw in FortiWeb (CVE-2025-25257) that allows remote code execution (RCE) by blindly trusting tokens, posing a high risk with a CVSS score of 9.6. Additionally, a critical vulnerability in Wing FTP Server (CVE-2025-47812) is under active attack through null byte injection via anonymous FTP access, enabling attackers to drop malware and execute commands as root; over 5,000 servers remain exposed. PerfektBlue Bluetooth vulnerabilities have been identified, exposing millions of vehicles to remote code execution risks. Another critical mcp-remote vulnerability also enables RCE and has impacted over 437,000 downloads. The rise of identity-based attacks and AI-related threats has been noted alongside lagging adoption of zero trust security models. These developments underscore the urgent need for organizations to apply patches and strengthen cybersecurity defenses promptly.
CISA confirms hackers are actively exploiting critical ‘Citrix Bleed 2’ bug: https://t.co/zjpv673hTi by TechCrunch #infosec #cybersecurity #technology #news
Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257): https://t.co/HAquoxasMW by The Hacker News #infosec #cybersecurity #technology #news
🚨 A critical flaw in Fortinet’s FortiWeb lets unauthenticated attackers run SQL commands remotely (CVSS 9.6). The bug? It blindly trusts tokens—letting attackers write to the file system. Fix it now or risk real damage. Read → https://t.co/4OrBKm3GTk