The week’s top vulnerabilities include several that could attract the attention of threat actors, and some that already have.
Cyble Vulnerability Intelligence researchers tracked 1,126 vulnerabilities in the last week, and nearly 200 already have publicly available Proofs-of-Concept (PoCs), raising the odds that the flaws will be exploited.
A total of 71 vulnerabilities were rated as critical under CVSS v3.1, while 21 received a critical severity rating under the newer CVSS v4.0 scoring system.
Here are some of the most critical vulnerabilities tracked by Cyble in the last week, including some under discussion on open source and underground forums.
Among the top vulnerabilities this week was CVE-2025-26399, a critical remote code execution (RCE) vulnerability in SolarWinds Web Help Desk (WHD), a web-based IT ticketing and asset management solution.
The vulnerability arises from an insecure deserialization flaw in the AjaxProxy component of WHD, potentially allowing an unauthenticated remote attacker to execute arbitrary code on affected systems with SYSTEM-level privileges.
The CVE-2025-26399 vulnerability is a patch bypass of CVE-2024-28988, which itself is a patch bypass of CVE-2024-28986. As CVE-2024-28986 is in CISA’s Known Exploited Vulnerabilities (KEV) catalog, CVE-2025-26399 may well draw the attention of threat actors.
Another noteworthy new vulnerability is CVE-2025-10035, a critical remote code execution (RCE) vulnerability affecting Fortra’s GoAnywhere Managed File Transfer (MFT) software. An attacker with a validly forged license response signature could potentially deserialize a malicious, actor-controlled Java object, triggering command injection and allowing arbitrary operating system command execution on the affected system.
MFT vulnerabilities have historically been targeted by threat and ransomware groups like CL0P, and there has been some evidence that CVE-2025-10035 is already being targeted. Cyble dark web researchers have also observed threat actors on underground forums discussing weaponization of CVE-2025-10035.
CISA added three vulnerabilities to its KEV catalog in the last week. They include:
Notable vulnerabilities discussed in open-source communities included:
Cyble dark web researchers also observed multiple threat actors on underground forums sharing and discussing exploits and weaponizing vulnerabilities. In addition to CVE-2025-10035, other vulnerabilities attracting threat actor attention included:
Cyble also identified a number of industrial control system (ICS) vulnerabilities for prioritization by security teams. They include:
CVE-2025-9494 and CVE-2025-9495 in Viessmann Vitogate 300 (versions prior to 3.1.0.1). The OS command injection and client-side enforcement of server-side security vulnerabilities could allow an attacker to execute unintended commands or bypass server-side protections to influence system behavior.
CVE-2025-54807 in Dover Fueling Solutions ProGauge MagLink LX4 / LX4 Plus / LX4 Ultimate. The use of hard-coded cryptographic key for token validation vulnerability could potentially allow an attacker who obtains the hard-coded signing key to bypass authentication and gain full access to the system.
CVE-2020-2883 in Hitachi Energy Service Suite: Versions prior to 9.6.0.4 EP4. The products are affected by a deserialization of untrusted data vulnerability that stems from the Oracle WebLogic Server component and could allow an unauthenticated attacker with network access via IIOP, T3 to compromise and take over Oracle WebLogic Server.
The high number of vulnerabilities this week – and strong interest in them from threat actors – serves as a reminder that cybersecurity threats are always changing and evolving. Rapid, well-targeted actions are needed to successfully defend IT and critical infrastructure, and a risk-based vulnerability management program should be at the heart of those defensive efforts.
Other cybersecurity best practices that can help guard against a wide range of threats include segmentation of critical assets; removing or protecting web-facing assets; Zero-Trust access principles; ransomware-resistant backups; hardened endpoints, infrastructure, and configurations; network, endpoint, and cloud monitoring; and well-rehearsed incident response plans.
Cyble’s comprehensive attack surface management solutions can help by scanning network and cloud assets for exposures and prioritizing fixes, in addition to monitoring for leaked credentials and other early warning signs of major cyberattacks.