Threat Intelligence Report
4 VulnerabilitiesExecutive Summary
A series of significant security vulnerabilities were revealed today, April 24, 2025, that carry profound implications for various sectors. Firstly, Grafana released a critical security update for a severe vulnerability (CVE-2025-3260) within its software. This vulnerability, if exploited, would allow an attacker to manipulate and exploit data in unauthorized ways. Similarly, NVIDIA's NeMo Framework was found to have high-risk vulnerabilities that could enable remote code execution, raising concerns about the potential for unauthorized access and control of affected systems. Other high-severity vulnerabilities were identified in GitLab, which could lead to cross-site scripting (XSS) and account takeovers if left unpatched, and in SonicWall's SSLVPN, where a vulnerability could lead to firewall crashes.
In addition to these individual vulnerabilities, a broader trend of increasing vulnerability exploitation was revealed in the Verizon 2025 Data Breach Investigations Report. This study indicates a surge in vulnerability exploitation and double the number of third-party breaches compared to previous years, suggesting an escalating risk environment. Specific vulnerabilities contributing to this trend include a critical flaw in Commvault Command Center (CVE-2025-34028) scoring a perfect 10 on the CVSS scale, a NetScaler console flaw (CVE-2024-6235) enabling admin access, and a backdoor in the xrpl.js SDK (CVE-2025-32965) that puts crypto wallets at risk. Lastly, a vulnerability in Redis servers has created potential for denial-of-service attacks. These findings underscore the urgency of prioritizing security measures and timely patches to mitigate potential threats.
High Priority Threats
Critical Vulnerabilities
The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when …
CVSS: 10.0High Impact Threats
A security vulnerability in the /apis/dashboard.grafana.app/* endpoints allows authenticated users to bypass dashboard and folder permissions. The vulnerability affects all …
CVSS: 8.3Detailed Analysis
Related Vulnerabilities
Description:
The Commvault Command Center Innovation Release allows an unauthenticated actor to upload ZIP files that represent install packages that, when expanded by the target server, are vulnerable to path traversal vulnerability that can result in Remote Code Execution via malicious JSP. This issue affects Command Center Innovation Release: 11.38.0 to 11.38.20. The vulnerability is fixed in 11.38.20 with SP38-CU20-433 and SP38-CU20-436 and also fixed in 11.38.25 with SP38-CU25-434 and SP38-CU25-438.
Affected Products
- Commvault Command Center Innovation Release
Exploitation Risk
Probability of exploitation in next 30 days
Description:
A security vulnerability in the /apis/dashboard.grafana.app/* endpoints allows authenticated users to bypass dashboard and folder permissions. The vulnerability affects all API versions (v0alpha1, v1alpha1, v2alpha1). Impact: - Viewers can view all dashboards/folders regardless of permissions - Editors can view/edit/delete all dashboards/folders regardless of permissions - Editors can create dashboards in any folder regardless of permissions - Anonymous users with viewer/editor roles are similarly affected Organization isolation boundaries remain intact. The vulnerability only affects dashboard access and does not grant access to datasources.
Affected Products
- Grafana Grafana
Exploitation Risk
Probability of exploitation in next 30 days
Description:
Sensitive information disclosure in NetScaler Console
Affected Products
- NetScaler NetScaler Console
- citrix netscaler_console
Exploitation Risk
Probability of exploitation in next 30 days
Description:
xrpl.js is a JavaScript/TypeScript API for interacting with the XRP Ledger in Node.js and the browser. Versions 4.2.1, 4.2.2, 4.2.3, and 4.2.4 of xrpl.js were compromised and contained malicious code designed to exfiltrate private keys. Version 2.14.2 is also malicious, though it is less likely to lead to exploitation as it is not compatible with other 2.x versions. Anyone who used one of these versions should stop immediately and rotate any private keys or secrets used with affected systems. Users of xrpl.js should pgrade to version 4.2.5 or 2.14.3 to receive a patch. To secure funds, think carefully about whether any keys may have been compromised by this supply chain attack, and mitigate by sending funds to secure wallets, and/or rotating keys. If any account's master key is potentially compromised, disable the key.
Affected Products
- XRPLF xrpl.js
Exploitation Risk
Probability of exploitation in next 30 days