Skip to content
Vulnerability Recap
What You Missed Last Week
Vulnerability Recap

Cybersecurity News, CVE Recaps, and Education Resource

  • Home
  • What You Missed Last Week
  • HackHer News
  • Cybersecurity Blog
Vulnerability Recap

Cybersecurity News, CVE Recaps, and Education Resource

CVE Updates (May 26 – June 1, 2025)

Vuln Recap Editor, June 2, 2025June 2, 2025

Here are the CVE updates for the week of May 26th through June 1st.

🔴 Critical Severity Vulnerabilities

Remote Code Execution and Authentication Bypass in Evertz SDVN 3080ipx-10G | CVE-2025-4009

Description: A critical vulnerability affects the Evertz SDVN 3080ipx-10G, a high-bandwidth Ethernet switching device used in professional video applications. The web management interface, exposed on port 80 and built with the PHP-based webEASY SDK (ewb), contains two exploitable flaws. First, attackers can bypass the authentication mechanism. Second, two endpoints within the interface are vulnerable to arbitrary command injection. These combined issues allow remote, unauthenticated attackers to gain root-level access and execute commands.

Potential Impacts:

  • Remote Code Execution: Attackers can run arbitrary commands as root without prior authentication.
  • Authentication Bypass: The login system can be defeated, granting full administrative privileges.
  • Media Service Disruption: Attackers may interrupt, hijack, or corrupt live media streams and captioning output.
  • Unauthorized System Modification: Malicious users can change system configurations, license settings, or networking parameters.

Mitigation Recommendations:

  • Restrict Access: Only permit access to the web interface from trusted internal networks.
  • Apply Vendor Patch: Reach out to Evertz for firmware updates or official mitigation steps.
  • Segment Networks: Isolate media switching equipment from other segments to minimize risk.
  • Monitor Logs: Consistently review system and web server logs for signs of intrusion or command execution.

SQL Injection in Navidrome /api/artist Endpoint | CVE-2025-48949

Description: Navidrome, an open-source music streaming server, suffers from a SQL injection flaw in versions 0.55.0 through 0.55.2. The issue stems from improper input validation of the role parameter in the /api/artist endpoint. A remote attacker can send crafted input that is injected into SQL queries, potentially gaining unauthorized access to backend data. This vulnerability is patched in version 0.56.0.

Potential Impacts:

  • Data Exposure: Attackers can extract sensitive user information from the database.
  • Data Manipulation: Malicious users may alter or delete database content.
  • Authentication Bypass: Gaining access to or changing credentials could allow system access.
  • Service Disruption: Crafted queries may crash or destabilize backend services.

Mitigation Recommendations:

  • Upgrade to v0.56.0: The vulnerability is resolved in this version.
  • Sanitize Inputs: Validate all API parameters to prevent injection.
  • Audit Logs: Regularly check logs for suspicious queries or errors.
  • Harden Database Access: Minimize privileges to reduce risk exposure.

🟠 High Severity Vulnerabilities

Incorrect Authorization in FortiClient for Mac | CVE-2025-25251

A privilege escalation issue was found in FortiClient for Mac, affecting versions 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, and 7.0.0 through 7.0.14. Because the app does not validate interprocess communication (XPC) messages properly, a local attacker could use specially crafted messages to gain elevated privileges.

Denial-of-Service via Malicious HTTP Header | CVE-2025-41653

Security analysts discovered a denial-of-service flaw in an undisclosed web server. An unauthenticated remote user can send a malformed HTTP request that crashes the service, thereby disrupting access.

Out-of-Bounds Write in V8 Engine in Chrome | CVE-2025-5280

Google Chrome (prior to version 137.0.7151.55) contains a memory handling flaw in the V8 JavaScript engine. When users visit a malicious HTML page, it may cause heap corruption and potentially allow attackers to execute arbitrary code.


🟡 Medium Severity Vulnerabilities

Incorrect Access Control in M2Soft CROWNIX Report & ERS | CVE-2024-57336

A flaw in M2Soft CROWNIX Report & ERS (versions 7.x through 7.4.3.599 and 8.x through 8.0.3.79) allows unauthorized attackers to access the Administrator account due to improper enforcement of user permissions. This could enable privilege escalation through authentication bypass.

Use-After-Free in libvpx in Chrome | CVE-2025-5283

This flaw, found in libvpx (used in VP8/VP9 video decoding), may be exploited by remote attackers through crafted HTML pages. If successful, it could lead to heap corruption.

Use-After-Free in libvpx in Chrome | CVE-2025-5295

Similar to CVE-2025-5283, this vulnerability also impacts libvpx in Chrome prior to version 137.0.7151.55. Attackers may exploit this issue to trigger memory corruption and possibly escalate control, depending on system conditions.

Post Views: 14
What You Missed Last Week cve recapCybersecurityCybersecurity UpdatesDOS HTTP HeaderEvertz SDVNForticlientlibvpx chromeM2Soft CROWNIX ReportMitigation RecommendationsNavidromePotential ImpactsV8 Engine ChromeVulnerabilities

Post navigation

Previous post
Next post

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

If you'd like to subscribe to our email, add your Name & E-Mail below.

Name
Email
The form has been submitted successfully!
There has been some error while submitting the form. Please verify all form fields again.
©2025 Vulnerability Recap | WordPress Theme by SuperbThemes