Flashpoint’s VulnDB documents over 400,000 vulnerabilities and has over 6,000 entries in Flashpoint’s KEV database, making it a critical resource as vulnerability exploitation rises. However, if your organization is relying solely on CVE data, you may be missing critical vulnerability metadata and insights that hinder timely remediation. That’s why we created this weekly series—where we surface and analyze the most high priority vulnerabilities security teams need to know about.
Key Vulnerabilities: 
Week of October 18 – October 24, 2025
Foundational Prioritization
Of the vulnerabilities Flashpoint published this week, there are 108 that you can take immediate action on. They each have a solution, a public exploit exists, and are remotely exploitable. As such, these vulnerabilities are a great place to begin your prioritization efforts.

Diving Deeper – Urgent Vulnerabilities
Of the vulnerabilities Flashpoint published last week, six are highlighted in this week’s Vulnerability Insights and Prioritization Report because they contain one or more of the following criteria:
- Are in widely used products and are potentially enterprise-affecting
- Are exploited in the wild or have exploits available
- Allow full system compromise
- Can be exploited via the network alone or in combination with other vulnerabilities
- Have a solution to take action on
In addition, all of these vulnerabilities are easily discoverable and therefore should be investigated and fixed immediately.
To proactively address these vulnerabilities and ensure comprehensive coverage beyond publicly available sources on an ongoing basis, organizations can leverage Flashpoint Vulnerability Intelligence. Flashpoint provides comprehensive coverage encompassing IT, OT, IoT, CoTs, and open-source libraries and dependencies. It catalogs over 100,000 vulnerabilities that are not included in the NVD or lack a CVE ID, ensuring thorough coverage beyond publicly available sources. The vulnerabilities that are not covered by the NVD do not yet have CVE ID assigned and will be noted with a VulnDB ID.
| CVE ID | Title | CVSS Scores (v2, v3, v4) | Exploit Status | Exploit Consequence | Ransomware Likelihood Score | Social Risk Score | Solution Availability | 
| VulnDB ID: 424051 | Multiple Extensions for Visual Studio Code Malicious Code Remote Code Execution (GlassWorm) | 10.0 10.0 10.0 | Exploited in the Wild | Remote Code Execution | Medium | N/A | Yes | 
| CVE-2025-62645 | Restaurant Brands International Assistant Platform createToken Mutation Incorrect Privilege Assignment Remote Privilege Escalation | 9.0 9.9 9.4 | Exploited in the Wild | Remote Privilege Escalation | Medium | Low | Yes | 
| CVE-2025-61932 | MOTEX Lanscope Endpoint Manager Client Program (MR) / Detection Agent (DA) Improper Origin Validation Packet Handling Remote Code Execution | 10.0 9.8 9.3 | Exploited in the Wild | Remote Code Execution | High | High | Yes | 
| CVE-2025-59503 | Microsoft Azure Compute Resource Provider Unspecified Server-side Request Forgery (SSRF) | 9.0 9.9 9.4 | Private | Server-side Request Forgery (SSRF) | High | Low | Yes | 
| CVE-2025-43995 | Dell Storage Manager /CompellentApiServices/CompellentAPIServices SessionKey / UserId Handling Improper Authentication Remote DSM Data Collector Protection Bypass | 10.0 9.8 9.3 | Public | Remote Protection Bypass | High | Medium | Yes | 
| CVE-2025-62168 | Squid Error Handling Missing HTTP Authentication Redaction Remote Credential Disclosure | 5.0 10.0 9.3 | PoC Public | Remote Credential Disclosure | High | Medium | Yes | 
NOTES:Â The severity of a given vulnerability score can change whenever new information becomes available. Flashpoint maintains its vulnerability database with the most recent and relevant information available. Login to view more vulnerability metadata and for the most up-to-date information.
CVSS scores: Our analysts calculate, and if needed, adjust NVD’s original CVSS scores based on new information being available.
Social Risk Score: Flashpoint estimates how much attention a vulnerability receives on social media. Increased mentions and discussions elevate the Social Risk Score, indicating a higher likelihood of exploitation. The score considers factors like post volume and authors, and decreases as the vulnerability’s relevance diminishes.
Ransomware Likelihood:Â This score is a rating that estimates the similarity between a vulnerability and those known to be used in ransomware attacks. As we learn more information about a vulnerability (e.g. exploitation method, technology affected) and uncover additional vulnerabilities used in ransomware attacks, this rating can change.
Flashpoint Ignite lays all of these components out. Below is an example of what this vulnerability record for VulnDB ID: 424051 looks like.

This record provides additional metadata like affected product versions, MITRE ATT&CK mapping, analyst notes, solution description, classifications, vulnerability timeline and exposure metrics, exploit references and more.
Analyst Comments on the Notable Vulnerabilities
Below, Flashpoint analysts describe the five vulnerabilities highlighted above as vulnerabilities that should be of focus for remediation if your organization is exposed.
VulnDB ID: 424051
Multiple extensions for Visual Studio Code were distributed with wormified malware, dubbed “GlassWorm,” as a result of malicious code that was injected to, e.g., the index.js file. Because of the usage of unprintable Unicode characters, the malicious code is not visible when viewing the code in an editor.
After another recent worm, “Shai-Hulud,” GlassWorm is the next self-propagating worm infecting VS Code extensions published on the Microsoft VS Code extension marketplace and OpenVSX. The payload searches for credentials for npm, GitHub, SSH, Git, OpenVSX, and various cryptocurrency wallet extensions and also includes full remote access functionality. The worm is reported as active, which means that the number of compromised extensions is expected to increase.
The injected code uses the Solana blockchain as its command and control (C2) and Google Calendar as a backup command server. The remote access functionality (ZOMBI module) allows attackers to obtain remote desktop access or use the affected system as a SOCKS proxy.
If a user has downloaded an affected version of an affected extension, their system is potentially compromised. The only way to ensure that it is completely safe is to freshly reinstall the operating system and all applications.
As of October 17, this has been reported as being exploited in the wild. At the time of this report, there is still no CVE ID assigned.
CVE-2025-62645
Restaurant Brands International Assistant Platform contains a flaw related to the createToken GraphQL mutation that is triggered as privileges are not correctly assigned. This may allow an authenticated, remote attacker to obtain a token to gain admin privileges.
As of September 6, this has been reported as being exploited in the wild. The vendor reportedly fixed this on the same day it was reported, but did not acknowledge the report directly. The exact details of the fix are unclear.
The researchers received a DMCA copyright infringement complaint from Cyble Inc., acting on behalf of Burger King, which alleges trademark infringement and claims the content “promotes illegal activity and spreads false information.” As a result, the researcher has removed the content from their blog. All relevant details of the vulnerabilities are still available in VulnDB and Ignite.
CVE-2025-61932
MOTEX Lanscope Endpoint Manager contains a flaw in the Client Program (MR) and Detection Agent (DA) that is triggered as the origin of incoming requests is not properly validated. This may allow a remote attacker to use a specially crafted packet to potentially execute arbitrary code. This impacts on-premise platforms only.
As of October 20, this is reported as being exploited in the wild.
CVE-2025-59503
Microsoft Azure Compute Resource Provider contains a flaw related to request handling between a client and a server, in which the server can be induced into performing unintended actions (Server Side Request Forgery, aka SSRF). By sending a specially crafted request, the server can be used to conduct host-based attacks. This may allow an authenticated, remote attacker to bypass access restrictions (e.g., host or network ACLs), conduct port scanning of internal networks, enumerate internal hosts, or possibly invoke additional protocols (e.g., Gopher, TFTP), which may give additional control over such requests.
This entry represents a vulnerability in a hosted, or cloud-based, service. While it does not require direct user action to remediate, the vendor has assigned it a CVE identifier and it has received this entry because of the prominence of the product and report.
The vendor’s CVSS score suggests that this allows for a complete compromise.
CVE-2025-43995
Dell Storage Manager contains a flaw related to application programming interfaces (APIs) exposed by ApiProxy.war in DataCollectorEar.ear that is triggered as authentication mechanisms are not properly implemented. This may allow a remote attacker to use a specially crafted SessionKey and UserId in a SOAP message to the /CompellentApiServices/CompellentAPIServices endpoint to bypass DSM Data Collector protection mechanisms.
CVE-2025-62168
Squid contains a flaw that is triggered as HTTP authentication headers are not redacted during error handling. This may allow a remote attacker to bypass browser security protections and disclose security tokens or credentials used internally by a web application that uses Squid for backend load balancing.
Previously Highlighted Vulnerabilities
| CVE/VulnDB ID | Flashpoint Published Date | 
| CVE-2025-21218 | Week of January 15, 2025 | 
| CVE-2024-57811 | Week of January 15, 2025 | 
| CVE-2024-55591 | Week of January 15, 2025 | 
| CVE-2025-23006 | Week of January 22, 2025 | 
| CVE-2025-20156 | Week of January 22, 2025 | 
| CVE-2024-50664 | Week of January 22, 2025 | 
| CVE-2025-24085 | Week of January 29, 2025 | 
| CVE-2024-40890 | Week of January 29, 2025 | 
| CVE-2024-40891 | Week of January 29, 2025 | 
| VulnDB ID: 389414 | Week of January 29, 2025 | 
| CVE-2025-25181 | Week of February 5, 2025 | 
| CVE-2024-40890 | Week of February 5, 2025 | 
| CVE-2024-40891 | Week of February 5, 2025 | 
| CVE-2024-8266 | Week of February 12, 2025 | 
| CVE-2025-0108 | Week of February 12, 2025 | 
| CVE-2025-24472 | Week of February 12, 2025 | 
| CVE-2025-21355 | Week of February 24, 2025 | 
| CVE-2025-26613 | Week of February 24, 2025 | 
| CVE-2024-13789 | Week of February 24, 2025 | 
| CVE-2025-1539 | Week of February 24, 2025 | 
| CVE-2025-27364 | Week of March 3, 2025 | 
| CVE-2025-27140 | Week of March 3, 2025 | 
| CVE-2025-27135 | Week of March 3, 2025 | 
| CVE-2024-8420 | Week of March 3, 2025 | 
| CVE-2024-56196 | Week of March 10, 2025 | 
| CVE-2025-27554 | Week of March 10, 2025 | 
| CVE-2025-22224 | Week of March 10, 2025 | 
| CVE-2025-1393 | Week of March 10, 2025 | 
| CVE-2025-24201 | Week of March 17, 2025 | 
| CVE-2025-27363 | Week of March 17, 2025 | 
| CVE-2025-2000 | Week of March 17, 2025 | 
| CVE-2025-27636 CVE-2025-29891 | Week of March 17, 2025 | 
| CVE-2025-1496 | Week of March 24, 2025 | 
| CVE-2025-27781 | Week of March 24, 2025 | 
| CVE-2025-29913 | Week of March 24, 2025 | 
| CVE-2025-2746 | Week of March 24, 2025 | 
| CVE-2025-29927 | Week of March 24, 2025 | 
| CVE-2025-1974 CVE-2025-2787 | Week of March 31, 2025 | 
| CVE-2025-30259 | Week of March 31, 2025 | 
| CVE-2025-2783 | Week of March 31, 2025 | 
| CVE-2025-30216 | Week of March 31, 2025 | 
| CVE-2025-22457 | Week of April 2, 2025 | 
| CVE-2025-2071 | Week of April 2, 2025 | 
| CVE-2025-30356 | Week of April 2, 2025 | 
| CVE-2025-3015 | Week of April 2, 2025 | 
| CVE-2025-31129 | Week of April 2, 2025 | 
| CVE-2025-3248 | Week of April 7, 2025 | 
| CVE-2025-27797 | Week of April 7, 2025 | 
| CVE-2025-27690 | Week of April 7, 2025 | 
| CVE-2025-32375 | Week of April 7, 2025 | 
| VulnDB ID: 398725 | Week of April 7, 2025 | 
| CVE-2025-32433 | Week of April 12, 2025 | 
| CVE-2025-1980 | Week of April 12, 2025 | 
| CVE-2025-32068 | Week of April 12, 2025 | 
| CVE-2025-31201 | Week of April 12, 2025 | 
| CVE-2025-3495 | Week of April 12, 2025 | 
| CVE-2025-31324 | Week of April 17, 2025 | 
| CVE-2025-42599 | Week of April 17, 2025 | 
| CVE-2025-32445 | Week of April 17, 2025 | 
| VulnDB ID: 400516 | Week of April 17, 2025 | 
| CVE-2025-22372 | Week of April 17, 2025 | 
| CVE-2025-32432 | Week of April 29, 2025 | 
| CVE-2025-24522 | Week of April 29, 2025 | 
| CVE-2025-46348 | Week of April 29, 2025 | 
| CVE-2025-43858 | Week of April 29, 2025 | 
| CVE-2025-32444 | Week of April 29, 2025 | 
| CVE-2025-20188 | Week of May 3, 2025 | 
| CVE-2025-29972 | Week of May 3, 2025 | 
| CVE-2025-32819 | Week of May 3, 2025 | 
| CVE-2025-27007 | Week of May 3, 2025 | 
| VulnDB ID: 402907 | Week of May 3, 2025 | 
| VulnDB ID: 405228 | Week of May 17, 2025 | 
| CVE-2025-47277 | Week of May 17, 2025 | 
| CVE-2025-34027 | Week of May 17, 2025 | 
| CVE-2025-47646 | Week of May 17, 2025 | 
| VulnDB ID: 405269 | Week of May 17, 2025 | 
| VulnDB ID: 406046 | Week of May 19, 2025 | 
| CVE-2025-48926 | Week of May 19, 2025 | 
| CVE-2025-47282 | Week of May 19, 2025 | 
| CVE-2025-48054 | Week of May 19, 2025 | 
| CVE-2025-41651 | Week of May 19, 2025 | 
| CVE-2025-20289 | Week of June 3, 2025 | 
| CVE-2025-5597 | Week of June 3, 2025 | 
| CVE-2025-20674 | Week of June 3, 2025 | 
| CVE-2025-5622 | Week of June 3, 2025 | 
| CVE-2025-5419 | Week of June 3, 2025 | 
| CVE-2025-33053 | Week of June 7, 2025 | 
| CVE-2025-5353 | Week of June 7, 2025 | 
| CVE-2025-22455 | Week of June 7, 2025 | 
| CVE-2025-43200 | Week of June 7, 2025 | 
| CVE-2025-27819 | Week of June 7, 2025 | 
| CVE-2025-49132 | Week of June 13, 2025 | 
| CVE-2025-49136 | Week of June 13, 2025 | 
| CVE-2025-50201 | Week of June 13, 2025 | 
| CVE-2025-49125 | Week of June 13, 2025 | 
| CVE-2025-24288 | Week of June 13, 2025 | 
| CVE-2025-6543 | Week of June 21, 2025 | 
| CVE-2025-3699 | Week of June 21, 2025 | 
| CVE-2025-34046 | Week of June 21, 2025 | 
| CVE-2025-34036 | Week of June 21, 2025 | 
| CVE-2025-34044 | Week of June 21, 2025 | 
| CVE-2025-7503 | Week of July 12, 2025 | 
| CVE-2025-6558 | Week of July 12, 2025 | 
| VulnDB ID: 411705 | Week of July 12, 2025 | 
| VulnDB ID: 411704 | Week of July 12, 2025 | 
| CVE-2025-6222 | Week of July 12, 2025 | 
| CVE-2025-54309 | Week of July 18, 2025 | 
| CVE-2025-53771 | Week of July 18, 2025 | 
| CVE-2025-53770 | Week of July 18, 2025 | 
| CVE-2025-54122 | Week of July 18, 2025 | 
| CVE-2025-52166 | Week of July 18, 2025 | 
| CVE-2025-53942 | Week of July 25, 2025 | 
| CVE-2025-46811 | Week of July 25, 2025 | 
| CVE-2025-52452 | Week of July 25, 2025 | 
| CVE-2025-41680 | Week of July 25, 2025 | 
| CVE-2025-34143 | Week of July 25, 2025 | 
| CVE-2025-50454 | Week of August 1, 2025 | 
| CVE-2025-8875 | Week of August 1, 2025 | 
| CVE-2025-8876 | Week of August 1, 2025 | 
| CVE-2025-55150 | Week of August 1, 2025 | 
| CVE-2025-25256 | Week of August 1, 2025 | 
| CVE-2025-43300 | Week of August 16, 2025 | 
| CVE-2025-34153 | Week of August 16, 2025 | 
| CVE-2025-48148 | Week of August 16, 2025 | 
| VulnDB ID: 416058 | Week of August 16, 2025 | 
| CVE-2025-32992 | Week of August 16, 2025 | 
| CVE-2025-7775 | Week of August 24, 2025 | 
| CVE-2025-8424 | Week of August 24, 2025 | 
| CVE-2025-34159 | Week of August 24, 2025 | 
| CVE-2025-57819 | Week of August 24, 2025 | 
| CVE-2025-7426 | Week of August 24, 2025 | 
| CVE-2025-58367 | Week of September 1, 2025 | 
| CVE-2025-58159 | Week of September 1, 2025 | 
| CVE-2025-58048 | Week of September 1, 2025 | 
| CVE-2025-39247 | Week of September 1, 2025 | 
| CVE-2025-8857 | Week of September 1, 2025 | 
| CVE-2025-58321 | Week of September 8, 2025 | 
| CVE-2025-58366 | Week of September 8, 2025 | 
| CVE-2025-58371 | Week of September 8, 2025 | 
| CVE-2025-55728 | Week of September 8, 2025 | 
| CVE-2025-55190 | Week of September 8, 2025 | 
| VulnDB ID: 419253 | Week of September 13, 2025 | 
| CVE-2025-10035 | Week of September 13, 2025 | 
| CVE-2025-59346 | Week of September 13, 2025 | 
| CVE-2025-55727 | Week of September 13, 2025 | 
| CVE-2025-10159 | Week of September 13, 2025 | 
| CVE-2025-20363 | Week of September 20, 2025 | 
| CVE-2025-20333 | Week of September 20, 2025 | 
| CVE-2022-4980 | Week of September 20, 2025 | 
| VulnDB ID: 420451 | Week of September 20, 2025 | 
| CVE-2025-9900 | Week of September 20, 2025 | 
| CVE-2025-52906 | Week of September 27, 2025 | 
| CVE-2025-51495 | Week of September 27, 2025 | 
| CVE-2025-27224 | Week of September 27, 2025 | 
| CVE-2025-27223 | Week of September 27, 2025 | 
| CVE-2025-54875 | Week of September 27, 2025 | 
| CVE-2025-41244 | Week of September 27, 2025 | 
| CVE-2025-61928 | Week of October 6, 2025 | 
| CVE-2025-61882 | Week of October 6, 2025 | 
| CVE-2025-49844 | Week of October 6 2025 | 
| CVE-2025-57870 | Week of October 6, 2025 | 
| CVE-2025-34224 | Week of October 6, 2025 | 
| CVE-2025-34222 | Week of October 6, 2025 | 
| CVE-2025-40765 | Week of October 11, 2025 | 
| CVE-2025-59230 | Week of October 11, 2025 | 
| CVE-2025-24990 | Week of October 11, 2025 | 
| CVE-2025-61884 | Week of October 11, 2025 | 
| CVE-2025-41430 | Week of October 11, 2025 | 
Transform Vulnerability Management with Flashpoint
Request a demo today to see how Flashpoint can transform your vulnerability intelligence, vulnerability management, and exposure identification program.



