Flashpoint’s VulnDB documents over 400,000 vulnerabilities and has over 4,500 entries in Flashpoint’s KEV database, making it a critical resource as vulnerability exploitation rises. However, if your organization is relying solely on CVE data, you may be missing critical vulnerability metadata and insights that hinder timely remediation. That’s why we created this weekly series—where we surface and analyze the most high priority vulnerabilities security teams need to know about.
Key Vulnerabilities:
Week of June 7 – June 13, 2025
Foundational Prioritization
Of the vulnerabilities Flashpoint published this week, there are 108 that you can take immediate action on. They each have a solution, a public exploit exists, and are remotely exploitable. As such, these vulnerabilities are a great place to begin your prioritization efforts.

Diving Deeper – Urgent Vulnerabilities
Of the vulnerabilities Flashpoint published last week, five are highlighted in this week’s Vulnerability Insights and Prioritization Report because they contain one or more of the following criteria:
- Are in widely used products and are potentially enterprise-affecting
- Are exploited in the wild or have exploits available
- Allow full system compromise
- Can be exploited via the network alone or in combination with other vulnerabilities
- Have a solution to take action on
In addition, all of these vulnerabilities are easily discoverable and therefore should be investigated and fixed immediately.
To proactively address these vulnerabilities and ensure comprehensive coverage beyond publicly available sources on an ongoing basis, organizations can leverage Flashpoint Vulnerability Intelligence. Flashpoint provides comprehensive coverage encompassing IT, OT, IoT, CoTs, and open-source libraries and dependencies. It catalogs over 100,000 vulnerabilities that are not included in the NVD or lack a CVE ID, ensuring thorough coverage beyond publicly available sources. The vulnerabilities that are not covered by the NVD do not yet have CVE ID assigned and will be noted with a VulnDB ID.
CVE ID | Title | CVSS Scores (v2, v3, v4) | Exploit Status | Exploit Consequence | Ransomware Likelihood Score | Social Risk Score | Solution Availability |
CVE-2025-33053 | Microsoft Windows Web Distributed Authoring and Versioning (WEBDAV) Unspecified URL Handling Arbitrary Code Execution | 9.3 8.8 8.6 | Exploited in the Wild | Arbitrary Code Execution | High | High | Yes |
CVE-2025-5353 | Ivanti Workspace Control Unspecified Hardcoded Cryptographic Key Local SQL Credential Disclosure | 2.1 8.8 9.3 | Private | Local SQL Credential Disclosure | Low | Low | Yes |
CVE-2025-22455 | Ivanti Workspace Control Unspecified Hardcoded Cryptographic Key Local SQL Credential Disclosure | 2.1 8.8 9.3 | Private | Local SQL Credential Disclosure | Low | Low | Yes |
CVE-2025-43200 | Apple iOS / iPadOS Messages iCloud Link Handling Logic Flaw Unspecified Remote Issue | 10.0 9.8 9.3 | Exploited in the Wild | Unspecified (Paragon Graphite Spyware) | High | High | Yes |
CVE-2025-27819 | Apache Kafka SASL JAAS JndiLoginModule Configuration JNDI Injection Remote Code Execution | 10.0 9.8 9.3 | Private | Remote Code Execution | High | Low | Yes |
NOTES: The severity of a given vulnerability score can change whenever new information becomes available. Flashpoint maintains its vulnerability database with the most recent and relevant information available. Login to view more vulnerability metadata and for the most up-to-date information.
CVSS scores: Our analysts calculate, and if needed, adjust NVD’s original CVSS scores based on new information being available.
Social Risk Score: Flashpoint estimates how much attention a vulnerability receives on social media. Increased mentions and discussions elevate the Social Risk Score, indicating a higher likelihood of exploitation. The score considers factors like post volume and authors, and decreases as the vulnerability’s relevance diminishes.
Ransomware Likelihood: This score is a rating that estimates the similarity between a vulnerability and those known to be used in ransomware attacks. As we learn more information about a vulnerability (e.g. exploitation method, technology affected) and uncover additional vulnerabilities used in ransomware attacks, this rating can change.
Flashpoint Ignite lays all of these components out. Below is an example of what this vulnerability record for CVE-2025-20289 looks like.

This record provides additional metadata like affected product versions, MITRE ATT&CK mapping, analyst notes, solution description, classifications, vulnerability timeline and exposure metrics, exploit references and more.
Analyst Comments on the Notable Vulnerabilities
Below, Flashpoint analysts describe the five vulnerabilities highlighted above as vulnerabilities that should be of focus for remediation if your organization is exposed.
CVE-2025-33053
Microsoft Windows contains a flaw in Web Distributed Authoring and Versioning (WEBDAV) that allows a context-dependent attacker to execute arbitrary code. Microsoft reported that a user must click on a specially crafted URL to be compromised by an attacker. It has been reported that the advanced persistent threat (APT) group “Stealth Falcon” (also known as “FruityArmor”) has exploited this vulnerability in zero-day attacks since March 2025 against defense and government organizations in Egypt, Qatar, Turkey, and Yemen.
CVE-2025-33053 is especially notable for being exploited in the wild by Stealth Falcon, a believed state actor. Microsoft addressed the vulnerability in its June Patch Tuesday updates, and organizations are urged to apply the patch immediately to mitigate the significant threat posed by this actively exploited flaw.
CVE-2025-5353 and CVE-2025-22455
Ivanti Workspace Control contains a hardcoded cryptographic key, which may allow a local, authenticated attacker to disclose stored SQL credentials.
CVE-2025-43200
Apple iOS and iPadOS contain a logic flaw related to the Messages application when processing a specially crafted photo or video. Apple notes that the photo or video is distributed via an iCloud link. However, further information provided by CitizenLab indicates that the issue can be exploited via a “zero-click attack.” While the exact impact of the vulnerability has not been disclosed, the attack has been linked to the Paragon “Graphite” spyware.
CVE-2025-27819
Apache Kafka contains a JNDI injection flaw in the SASL JAAS JndiLoginModule configuration. This flaw may allow an authenticated, remote attacker to redirect requests to an attacker-controlled LDAP server and in turn cause a denial of service or potentially execute arbitrary code. According to Apache Kafka, this vulnerability may only be exploited by an attacker “able to connect to the Kafka cluster [with] the AlterConfigs permission on the cluster resource.”
Previously Highlighted Vulnerabilities
CVE/VulnDB ID | Flashpoint Published Date |
CVE-2025-21218 | Week of January 15, 2025 |
CVE-2024-57811 | Week of January 15, 2025 |
CVE-2024-55591 | Week of January 15, 2025 |
CVE-2025-23006 | Week of January 22, 2025 |
CVE-2025-20156 | Week of January 22, 2025 |
CVE-2024-50664 | Week of January 22, 2025 |
CVE-2025-24085 | Week of January 29, 2025 |
CVE-2024-40890 | Week of January 29, 2025 |
CVE-2024-40891 | Week of January 29, 2025 |
VulnDB ID: 389414 | Week of January 29, 2025 |
CVE-2025-25181 | Week of February 5, 2025 |
CVE-2024-40890 | Week of February 5, 2025 |
CVE-2024-40891 | Week of February 5, 2025 |
CVE-2024-8266 | Week of February 12, 2025 |
CVE-2025-0108 | Week of February 12, 2025 |
CVE-2025-24472 | Week of February 12, 2025 |
CVE-2025-21355 | Week of February 24, 2025 |
CVE-2025-26613 | Week of February 24, 2025 |
CVE-2024-13789 | Week of February 24, 2025 |
CVE-2025-1539 | Week of February 24, 2025 |
CVE-2025-27364 | Week of March 3, 2025 |
CVE-2025-27140 | Week of March 3, 2025 |
CVE-2025-27135 | Week of March 3, 2025 |
CVE-2024-8420 | Week of March 3, 2025 |
CVE-2024-56196 | Week of March 10, 2025 |
CVE-2025-27554 | Week of March 10, 2025 |
CVE-2025-22224 | Week of March 10, 2025 |
CVE-2025-1393 | Week of March 10, 2025 |
CVE-2025-24201 | Week of March 17, 2025 |
CVE-2025-27363 | Week of March 17, 2025 |
CVE-2025-2000 | Week of March 17, 2025 |
CVE-2025-27636 CVE-2025-29891 | Week of March 17, 2025 |
CVE-2025-1496 | Week of March 24, 2025 |
CVE-2025-27781 | Week of March 24, 2025 |
CVE-2025-29913 | Week of March 24, 2025 |
CVE-2025-2746 | Week of March 24, 2025 |
CVE-2025-29927 | Week of March 24, 2025 |
CVE-2025-1974 CVE-2025-2787 | Week of March 31, 2025 |
CVE-2025-30259 | Week of March 31, 2025 |
CVE-2025-2783 | Week of March 31, 2025 |
CVE-2025-30216 | Week of March 31, 2025 |
CVE-2025-22457 | Week of April 2, 2025 |
CVE-2025-2071 | Week of April 2, 2025 |
CVE-2025-30356 | Week of April 2, 2025 |
CVE-2025-3015 | Week of April 2, 2025 |
CVE-2025-31129 | Week of April 2, 2025 |
CVE-2025-3248 | Week of April 7, 2025 |
CVE-2025-27797 | Week of April 7, 2025 |
CVE-2025-27690 | Week of April 7, 2025 |
CVE-2025-32375 | Week of April 7, 2025 |
VulnDB ID: 398725 | Week of April 7, 2025 |
CVE-2025-32433 | Week of April 12, 2025 |
CVE-2025-1980 | Week of April 12, 2025 |
CVE-2025-32068 | Week of April 12, 2025 |
CVE-2025-31201 | Week of April 12, 2025 |
CVE-2025-3495 | Week of April 12, 2025 |
CVE-2025-31324 | Week of April 17, 2025 |
CVE-2025-42599 | Week of April 17, 2025 |
CVE-2025-32445 | Week of April 17, 2025 |
VulnDB ID: 400516 | Week of April 17, 2025 |
CVE-2025-22372 | Week of April 17, 2025 |
CVE-2025-32432 | Week of April 29, 2025 |
CVE-2025-24522 | Week of April 29, 2025 |
CVE-2025-46348 | Week of April 29, 2025 |
CVE-2025-43858 | Week of April 29, 2025 |
CVE-2025-32444 | Week of April 29, 2025 |
CVE-2025-20188 | Week of May 3, 2025 |
CVE-2025-29972 | Week of May 3, 2025 |
CVE-2025-32819 | Week of May 3, 2025 |
CVE-2025-27007 | Week of May 3, 2025 |
VulnDB ID: 402907 | Week of May 3, 2025 |
VulnDB ID: 405228 | Week of May 17, 2025 |
CVE-2025-47277 | Week of May 17, 2025 |
CVE-2025-34027 | Week of May 17, 2025 |
CVE-2025-47646 | Week of May 17, 2025 |
VulnDB ID: 405269 | Week of May 17, 2025 |
VulnDB ID: 406046 | Week of May 19, 2025 |
CVE-2025-48926 | Week of May 19, 2025 |
CVE-2025-47282 | Week of May 19, 2025 |
CVE-2025-48054 | Week of May 19, 2025 |
CVE-2025-41651 | Week of May 19, 2025 |
CVE-2025-20289 | Week of June 3, 2025 |
CVE-2025-5597 | Week of June 3, 2025 |
CVE-2025-20674 | Week of June 3, 2025 |
CVE-2025-5622 | Week of June 3, 2025 |
CVE-2025-5419 | Week of June 3, 2025 |
Transform Vulnerability Management with Flashpoint
Fill out the form to the left to subscribe to our newsletter, which features Flashpoint’s leading data and intelligence. Request a demo today to see how Flashpoint can transform your vulnerability management and exposure identification program.