Researchers have identified a critical vulnerability in the open-source JavaScript framework Next.js, designated CVE-2025-29927, which could allow attackers to bypass authorization in middleware and gain unauthorized access to targeted systems. This vulnerability is currently under active exploitation. Additionally, another serious flaw in NetApp SnapCenter, labeled CVE-2025-26512 with a CVSS score of 9.9, enables authenticated users to escalate their privileges to full admin rights on remote systems. This vulnerability poses a risk to enterprise backup systems widely utilized across various sectors. The Cybersecurity and Infrastructure Security Agency (CISA) has also flagged two older vulnerabilities from 2019 in Sitecore, CVE-2019-9874 and CVE-2019-9875, as actively exploited, highlighting ongoing threats from previously identified flaws. Furthermore, the IngressNightmare exploit chain, including CVE-2025-1974, has been detailed by researchers, indicating a broader concern for security across multiple platforms.
There are already a few PoCs out there, but I wanted to understand—at a fundamental level—what the vulnerability in NGINX was that everyone was freaking out about. After reading Wiz’s research and spending a few nights on it, I replicated the IngressNightmare (CVE-2025-1974) from https://t.co/2M7WwWIDTS
CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devices https://t.co/CZq8UvncTm
👀 6-year-old bugs are back—and being weaponized. CISA just flagged two 2019 Sitecore RCE flaws (CVE-2019-9874 & 9875) as actively exploited. But it doesn’t stop there: ➡️ Next.js auth bypass (CVE-2025-29927) is under live attack ➡️ DrayTek routers face fresh waves targeting https://t.co/0WKTIeyuuc