Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The map that takes you to the release release date: when and where to see it online?

    August 6, 2025

    Disney Hulu is closing the app – what customers should know here

    August 6, 2025

    Gartner’s AI propaganda cycle shows that AI technology is at its peak – but will it do?

    August 6, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Emergency improvement for AEM after releasing POCs after releasing emergency fix for AEM
    Security

    Emergency improvement for AEM after releasing POCs after releasing emergency fix for AEM

    PineapplesUpdateBy PineapplesUpdateAugust 6, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Emergency improvement for AEM after releasing POCs after releasing emergency fix for AEM
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Emergency improvement for AEM after releasing POCs after releasing emergency fix for AEM

    Adobe issued emergency updates for two zero-day flaws in Adobe Experience Manager (AEM) form on JEE after revealing the POC Explightening Chain, which can be used for informal, distant code execution on weak examples.

    Flaws are tracked as CVE-2025-54253 and CVE-2025-54254:

    • Cve-2025-54253: Misconfiguration allows arbitrary code execution. “Critical” rated with a CVSS score of 8.6.
    • CVE-2025-54254: The unfair restriction of the XML external unit reference (XXE) allows arbitrary file system to read. Maximum-seriousness rated “critical” with 10.0 CVSS score.

    Adobe Fixed flaws In the latest versions Described in this advisor,

    The weaknesses were discovered by Shubam Shah and Searchlight Cyber’s Adam Cuse, who revealed Adobe on April 28, 2025 with a third point, CVE-2025–495333.

    Adobe initially patted the CVE-2025–49533 on 5 August, leaving the other two flaws for more than 90 days.

    After warning Adobe of its disclosure timeline, researchers published technical writing On July 29, how the weaknesses work and how they can be exploited.

    According to the researchers, the CVE-2025-49533 is a Java disorganization defect that is in the formsever module that allows informal remote code execution (RCE). A services process the user-supplied data and process it without decoding and verification, which sends a malicious payload to execute the command on the attackers server.

    XXE vulnerability, tracked as the CVE-2025-54254, affects a web service that handles the SOAP authentication. By submitting a specially designed XML payload, the attacker can trick the service to highlight the local files, such as Win.ini, without authentication.

    Finally, the CVE-2025–54253 defect is caused by a certification bypass in combination with a misunderstanding developer setting.

    Researchers found that the growth mode of Storts 2 was accidentally enabled, allowing the attackers to execute OGNL manifestations through debug parameters sent to HTTP requests.

    Since the flaws allow remote code execution on the weak server, all admins are advised to install the latest updates and hotfix as soon as possible.

    If this is not possible, researchers strongly recommend restricting access from the Internet to the forum.


    Picus Red Report 2025

    Malware targeting password stores increased 3x as the attackers secretly carried out the perfect history landscape, infiltrated and exploited important systems.

    Search for the top 10 Metter Att & CK techniques behind the 93% attacks and how to defend them.

    AEM emergency fix improvement POCs releasing
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleVolume sheds 5% as a quadruple, tests major support areas
    Next Article Should you upgrade M4 to M4 MacBook Pro? I did, and it was perfectly worth it
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Akira Rainmware misused CPU tuning tool to disable Microsoft defender

    August 6, 2025
    Security

    How not a North Korean to spy it

    August 6, 2025
    Security

    My new favorite kitchen holder can carry up to 14 keys (and is trackable by phone)

    August 6, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    The map that takes you to the release release date: when and where to see it online?

    August 6, 2025

    Disney Hulu is closing the app – what customers should know here

    August 6, 2025

    Gartner’s AI propaganda cycle shows that AI technology is at its peak – but will it do?

    August 6, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.