Vulnerabilities affecting n8n, OpenSSL and GNU Inetutils are among the many flaws being observed by menace actors and safety researchers alike.
Cyble Vulnerability Intelligence researchers tracked 1,147 vulnerabilities in the final week, and greater than 128 of the disclosed vulnerabilities have already got a publicly out there Proof-of-Idea (PoC), considerably rising the probability of real-world assaults.
A complete of 108 vulnerabilities have been rated as crucial underneath the CVSS v3.1 scoring system, whereas 54 obtained a crucial severity score based mostly on the newer CVSS v4.0 scoring system.
Under are a few of the IT vulnerabilities flagged by Cyble menace intelligence researchers for prioritization by safety groups in current reviews to purchasers.
The Week’s High IT Vulnerabilities
Cyble’s community of honeypot sensors detected assault makes an attempt on CVE-2025-68613, a crucial distant code execution flaw within the n8n open-source workflow automation platform. Workflow expressions equipped by authenticated customers might execute in an insufficiently remoted context underneath the Improper Management of Dynamically-Managed Code Sources flaw, doubtlessly enabling arbitrary code execution with n8n privileges and potential full system compromise. The problem is mounted in variations 1.120.4, 1.121.1, and 1.122.0.
Vulnerabilities producing dialogue in open-source communities included CVE-2025-8088, a high-severity path traversal vulnerability in WinRAR that exploits Alternate Information Streams (ADS) in crafted RAR archives. The vulnerability was added to CISA’s Recognized Exploited Vulnerabilities (KEV) catalog final August, however current reviews reveal that a number of actors, together with nation-state adversaries and financially motivated teams, are exploiting the flaw to set up preliminary entry and deploy a various array of payloads.
Additionally underneath lively dialogue is CVE-2025-15467, a crucial stack buffer overflow in OpenSSL’s CMS (Cryptographic Message Syntax) AuthEnvelopedData parsing when utilizing AEAD ciphers like AES-GCM. OpenSSL 3.6, 3.5, 3.4, 3.3 and three.0 are susceptible to the challenge, whereas FIPS modules and OpenSSL 1.1.1 and 1.0.2 usually are not.
Among the many current additions to CISA’s Recognized Exploited Vulnerabilities (KEV) catalog have been CVE-2026-24858, an authentication bypass vulnerability in Fortinet merchandise; CVE-2025-68645, a Native File Inclusion (LFI) vulnerability within the Webmail Basic UI of Zimbra Collaboration Suite (ZCS); and CVE-2026-1281, an Ivanti Endpoint Supervisor Cell (EPMM) Code Injection vulnerability.
CVE-2026-24061 is one other current CISA KEV addition, a crucial authentication bypass vulnerability in GNU Inetutils telnetd. The flaw lies within the improper neutralization of argument delimiters, particularly permitting an attacker to inject the “-f root” worth into the USER atmosphere variable. After profitable exploitation, a distant unauthenticated attacker can bypass authentication mechanisms to realize instant root-level entry to the system over the community. Cyble darkish internet researchers have noticed menace actors on underground boards discussing weaponizing the vulnerability.
One other vulnerability underneath dialogue by menace actors on the darkish internet is CVE-2025-27237, a high-severity native privilege escalation vulnerability affecting Zabbix Agent and Agent 2 on Home windows. The vulnerability is attributable to an uncontrolled search path that hundreds the OpenSSL configuration file from a listing writable by low-privileged customers. By modifying this configuration file and injecting a malicious DLL, a neighborhood attacker might elevate their privileges to the SYSTEM stage on the affected Home windows host.
CVE-2026-22794, a crucial authentication bypass vulnerability in Appsmith, can be underneath lively dialogue by menace actors. The flaw happens as a result of the applying trusts a user-controlled HTTP “Origin” header throughout security-sensitive workflows, akin to password resets. An attacker might use this to generate fraudulent hyperlinks that, when clicked by a sufferer, ship secret authentication tokens to an attacker-controlled area, enabling full account takeover of any consumer, together with directors.
Amongst industrial management system (ICS) vulnerabilities of be aware, Festo Didactic SE MES PCs shipped with Home windows 10 embody a duplicate of XAMPP that incorporates round 140 vulnerabilities from third-party open-source functions, CISA stated in a current advisory. The points could be mounted by changing XAMPP with Festo Didactic’s Manufacturing facility Management Panel utility.
Conclusion
The excessive variety of quantity of open-source vulnerabilities this week highlights the ever-present menace of software program provide chain assaults, requiring fixed vigilance by each safety and improvement groups. Greatest practices aimed toward lowering cyber threat and enhancing resilience embody:
- Defending web-facing property.
- Segmenting networks and demanding property.
- Hardening endpoints and infrastructure.
- Robust entry controls, permitting no extra entry than is required, with frequent verification.
- A powerful supply of consumer id and authentication, together with multi-factor authentication and biometrics, in addition to machine authentication with gadget compliance and well being checks.
- Encryption of information at relaxation and in transit.
- Ransomware-resistant backups which might be immutable, air-gapped, and remoted as a lot as attainable.
- Honeypots that lure attackers to pretend property for early breach detection.
- Correct configuration of APIs and cloud service connections.
- Monitoring for uncommon and anomalous exercise with SIEM, Energetic Listing monitoring, endpoint safety, and information loss prevention (DLP) instruments.
- Routinely assessing and confirming controls by way of audits, vulnerability scanning, and penetration assessments.
Cyble’s complete assault floor administration options may help by scanning community and cloud property for exposures and prioritizing fixes, along with monitoring for leaked credentials and different early warning indicators of main cyberattacks.
Moreover, Cyble’s third-party threat intelligence can assist organizations rigorously vet companions and suppliers, offering an early warning of potential dangers.

