Introduction
This vulnerability report has been generated using data aggregated on Vulnerability-Lookup, with contributions from the platform’s community.
It highlights the most frequently mentioned vulnerability for May 2025, based on sightings collected from various sources, including MISP, Exploit-DB, Bluesky, Mastodon, GitHub Gists, The Shadowserver Foundation, Nuclei, and more. For further details, please visit this page.
The final section focuses on exploitations observed through The Shadowserver Foundation's honeypot network.
Top 10 vulnerabilities of the month
Vulnerability | Vendor | Product | Severity | VLAI Severity |
---|---|---|---|---|
CVE-2025-31324 | SAP_SE | SAP NetWeaver (Visual Composer development server) | Critical | Critical |
CVE-2025-4427 | Ivanti | Endpoint Manager Mobile | Medium | Critical |
CVE-2025-37899 | Linux | Linux | High | |
CVE-2025-4428 | Ivanti | Endpoint Manager Mobile | High | High |
CVE-2025-32756 | Fortinet | FortiVoice | Critical | Critical |
CVE-2025-4664 | Chrome | Medium | Medium | |
CVE-2025-20188 | Cisco | Cisco IOS XE Software | Critical | Critical |
CVE-2017-18368 | ZyXEL | P660HN-T1A | Critical | Critical |
CVE-2015-2051 | D-Link | DIR-645 | High | Critical |
CVE-2024-38475 | Apache Software Foundation | Apache HTTP Server | Critical | Critical |
Evolution for the top 5 vulnerabilities
- CVE-2025-31324 - SAP / SAP NetWeaver (Visual Composer development server)
- CVE-2025-4427 - Ivanti / Endpoint Manager Mobile
- CVE-2025-37899 - Linux / Linux
- CVE-2025-4428 - Ivanti / Endpoint Manager Mobile
- CVE-2025-32756 - Fortinet / FortiVoice
Insights from contributors
CVE-2025-22252: Authentication Vulnerability in FortiOS, FortiProxy, and FortiSwitchManager leads to Unauthenticated Admin Access
CVE-2025-22252 is a missing authentication for critical function vulnerability in devices configured to use a remote TACACS+ server for authentication configured to use ASCII authentication. It may allow an attacker with knowledge of an existing admin account to access the device as a valid admin via an authentication bypass, potentially resulting in complete system compromise, data theft and service disruption.
CVE-2025-30663: Additional information
In its security release of 13 May 2025, Zoom addressed two vulnerabilities that could be exploited for privilege escalation: • CVE-2025-30663, a time-of-check time-of-use race condition affecting some Zoom Workplace Apps. If successfully exploited, an authenticated user could conduct an escalation of privilege via local access. • CVE-2025-30664 is an improper neutralization of special elements flaw affecting some Zoom Workplace Apps. Successful exploitation could allow an authenticated user to conduct an escalation of privilege via local access.
CVE-2025-41229: More information
The vulnerabilities could be used by attackers to gain access to services and data. They can also be used to execute arbitrary commands and cause a denial of service. Confidentiality, integrity and availability are all impacted. The only solution is to upgrade immediately.
2025-27920: Additional information
Microsoft discovered critical vulnerability CVE-2025-27920 affecting the messaging application Output Messenger. Microsoft additionally observed exploitation of the vulnerability since April 2024. According to Microsoft, the attacker needs to be authenticated, although the Output Messenger advisory indicates that privileges are not required to exploit the vulnerability. An attacker could upload malicious files into the server’s startup directory by exploiting this directory traversal vulnerability. This allows an attacker to gain indiscriminate access to the communications of every user, steal sensitive data and impersonate users, possibly leading to operational disruptions, unauthorized access to internal systems, and widespread credential compromise.
Continuous exploitation
- CVE-2023-0656 - SonicWall / SonicOS (not in CISA KEV)
- CVE-2022-26134 - Atlassian / Confluence Data Center
- CVE-2019-1653 - Cisco / Cisco Small Business RV Series Router Firmware
Thank you
Thank you to all the contributors and our diverse sources!
If you want to contribute to the next report, you can create your account.
Feedback and Support
If you have suggestions, please feel free to open a ticket on our GitHub repository. Your feedback is invaluable to us!
https://github.com/vulnerability-lookup/vulnerability-lookup/issues/
I will investigate this! Thank you!