Articles
Newsflash
25 Apr 2025 Data Management and Analytics
Redis: Unauthenticated Clients Can Cause Memory Exhaustion via Unbounded Output Buffers

In Redis versions 2.6 to 7.4.2 a medium severity vulnerability CVE-2025-21605 was detected. This vulnerability allows unauthenticated clients to trigger unbounded growth of output buffers, leading to memory exhaustion or service crashes, due to Redis not limiting output buffers for unauthenticated clients by default and repeated “NOAUTH” responses filling memory. To address this issue, users should upgrade Redis to versions 7.4.3 or later. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2025-21605.

Read more
Database
25 Apr 2025 Communication and Collaboration
Mattermost: Denial of Service via Malicious RetrospectivePost Props in Playbooks

In Mattermost versions 10.4.x ≤ 10.4.2, 10.5.x ≤ 10.5.0 and 9.11.x ≤ 9.11.10 a medium severity vulnerability CVE-2025-41395 was detected. This issue arises from improper validation of `props` in the `RetrospectivePost` custom post type in the Playbooks plugin, allowing attackers to craft posts that can trigger a denial of service (DoS) across the web app for all users. To address this issue, users should upgrade Mattermost to versions 10.6.0, 10.4.3, 10.5.1, 9.11.11 or later. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2025-41395.

Read more
Communication
25 Apr 2025 Communication and Collaboration
Mattermost: DoS via Excessive Task Actions in GraphQL UpdateRunTaskActions Operation

In Mattermost versions 10.4.x ≤ 10.4.2, 10.5.x ≤ 10.5.0 and 9.11.x ≤ 9.11.10 a medium severity vulnerability CVE-2025-35965 was identified. The issue lies in the failure to validate the uniqueness and quantity of task actions within the UpdateRunTaskActions GraphQL operation, allowing attackers to create tasks with excessive triggered actions that can overwhelm the server and cause a denial-of-service (DoS) condition. To resolve this issue, users should upgrade Mattermost to versions 10.6.0, 10.4.3, 10.5.1, 9.11.11 or later. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2025-35965.

Read more
Communication
25 Apr 2025 Business and Enterprise Solutions
WordPress: Order Manipulation via Insecure ‘add_offer_in_cart’ Function in Upsell Funnel Builder Plugin

In Upsell Funnel Builder for WooCommerce plugin for WordPress versions up to and including 3.0.0 a medium severity vulnerability CVE-2025-3743 was detected. This vulnerability allows unauthenticated attackers to manipulate the product ID and discount field associated with any order bump, enabling them to arbitrarily update the product and discount when adding it to the cart. To address this issue, users should upgrade Upsell Funnel Builder for WooCommerce plugin to versions 3.0.1 or later. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2025-3743.

Read more
CMS
25 Apr 2025 Business and Enterprise Solutions
WordPress: Arbitrary File Read via Insecure Remote File Access in Mayosis Core Plugin

In Mayosis Core plugin for WordPress versions up to and including 5.4.1 a high severity vulnerability CVE-2025-1565 was detected. This vulnerability allows attackers to read the contents of arbitrary files on the server, potentially exposing sensitive information. To address this issue, users should upgrade Mayosis Core plugin to versions 5.4.2 or later. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2025-1565.

Read more
CMS
24 Apr 2025 Communication and Collaboration
Mattermost: Unauthorized Post Deletion via Playbooks API Endpoint

In Mattermost versions 10.4.x ≤ 10.4.2, 10.5.x ≤ 10.5.0 and 9.11.x ≤ 9.11.10 a low severity vulnerability CVE-2025-41423 was detected. This issue allows any user or attacker to delete posts created by the Playbooks bot through the `/plugins/playbooks/api/v0/signal/keywords/ignore-thread` API endpoint, even without channel access or proper permissions. To address this issue, users should upgrade Mattermost to versions 10.6.0, 10.4.3, 10.5.1, 9.11.11 or later. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2025-41423.

Read more
Communication
Case Studies