Threat Intelligence Report
2 VulnerabilitiesExecutive Summary
The most critical vulnerability today is CVE-2024-2787, which affects Apple's archive utility, enabling arbitrary file write and bypassing Gatekeeper, Apple's security feature that enforces code signing and verifies downloaded applications before allowing them to run. This presents severe implications as it could potentially allow an attacker to execute malicious code without user intervention. A proof-of-concept exploit has been released, increasing the urgency for users to update their systems.
In other news, Microsoft’s patch for a previous symlink vulnerability has inadvertently introduced a new flaw, which can lead to a denial-of-service (DoS) attack on Windows Update, preventing users from receiving necessary security updates. Also, CVE-2025-31324, a critical zero-day vulnerability in SAP NetWeaver, is currently being exploited in the wild. Attackers are deploying web shells and command-and-control (C2) frameworks, enabling them to maintain persistence and potentially take over affected systems. It is of utmost importance for organizations using SAP NetWeaver to apply the necessary patches immediately to mitigate this high-risk vulnerability. Today's findings underscore the relentless dynamic nature of cybersecurity, underscoring the need for continuous vigilance and prompt action on identified vulnerabilities.
High Priority Threats
Critical Vulnerabilities
SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious …
CVSS: 10.0High Impact Threats
Detailed Analysis
Related Vulnerabilities
Description:
SAP NetWeaver Visual Composer Metadata Uploader is not protected with a proper authorization, allowing unauthenticated agent to upload potentially malicious executable binaries that could severely harm the host system. This could significantly affect the confidentiality, integrity, and availability of the targeted system.
Affected Products
- SAP_SE SAP NetWeaver (Visual Composer development server)
Exploitation Risk
Probability of exploitation in next 30 days
Description:
The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Page Title HTML Tag in all versions up to, and including, 3.10.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected Products
- thehappymonster Happy Addons for Elementor
- wedevs happy_addons_for_elementor
Exploitation Risk
Probability of exploitation in next 30 days