U.S. CISA Adds Multiple Vulnerabilities to Known Exploited Vulnerabilities Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added several vulnerabilities from popular software tools to its Known Exploited Vulnerabilities (KEV) catalog, a resource aimed at helping federal agencies and private organizations prioritize their cybersecurity efforts.

Multit Router Looking Glass (MRLG) Flaw

CISA has added a vulnerability in the fastping.c component of MRLG before version 5.5.0, which allows remote attackers to perform an arbitrary memory write, leading to memory corruption. This flaw was identified by security experts and can be exploited by a remote unauthenticated attacker to execute malicious code.

PHPMailer Flaw

A vulnerability in PHPMailer version 5.2.17 and earlier can also be exploited by a remote unauthenticated attacker to execute arbitrary code on the web server, compromising the target web application. This flaw was discovered by notorious security expert Dawid Golunski from Legal Hackers.

Rails Ruby on Rails Flaw

A File Content Disclosure issue in Action View, a component of Ruby on Rails, affects multiple versions and allows attackers to manipulate the way the framework resolves templates. This can lead to rendering arbitrary files from the server's filesystem, including secret configuration files and /etc/passwd.

Zimbra Collaboration Suite Flaw

A vulnerability in Zimbra Collaboration Suite before 8.6 patch 13, 8.7.x before 8.7.11 patch 10, and 8.8.x before 8.8.10 patch 7 or 8.8.x before 8.8.11 patch 3 allows Server-Side Request Forgery (SSRF) via the ProxyServlet component.

Immediate Action Required

CISA has ordered federal agencies to fix these vulnerabilities by July 28, 2025. Experts recommend that private organizations review the KEV catalog and address these vulnerabilities in their infrastructure to protect against attacks exploiting the flaws in the catalog. The CISA's Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities emphasizes the need for agencies to prioritize the identified vulnerabilities by the due date.

Stay informed about the latest cybersecurity threats and vulnerabilities by following me on Twitter (@securityaffairs), Facebook, and Mastodon.