RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

Date:

Share post:

Nov 15, 2025Ravie LakshmananMalware / Vulnerability

The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against a critical security flaw that could allow attackers to achieve arbitrary code execution.

The vulnerability in question is CVE-2025-24893 (CVSS score: 9.8), an eval injection bug that could allow any guest user to perform arbitrary remote code execution through a request to the “/bin/get/Main/SolrSearch” endpoint. It was patched by the maintainers in XWiki 15.10.11, 16.4.1, and 16.5.0RC1 in late February 2025.

While there was evidence that the shortcoming had been exploited in the wild since at least March, it wasn’t until late October, when VulnCheck disclosed it had observed fresh attempts weaponizing the flaw as part of a two-stage attack chain to deploy a cryptocurrency miner.

DFIR Retainer Services

Subsequently, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to apply necessary mitigations by November 20.

In a fresh report published Friday, VulnCheck revealed that it has since observed a spike in exploitation attempts, hitting a new high on November 7, followed by another surge on November 11. This indicates broader scanning activity likely driven by multiple threat actors participating in the effort.

This includes RondoDox, a botnet that’s rapidly adding new exploitation vectors to rope susceptible devices into a botnet for conducting distributed denial-of-service (DDoS) attacks using HTTP, UDP, and TCP protocols. The first RondoDox exploit was observed on November 3, 2025, per the cybersecurity company.

Other attacks have been observed exploiting the flaw to deliver cryptocurrency miners, as well as attempts to establish a reverse shell and general probing activity using a Nuclei template for CVE-2025-24893.

The findings once again illustrate the need for adopting robust patch management practices to ensure optimal protection.

“CVE-2025-24893 is a familiar story: one attacker moves first, and many follow,” VulnCheck’s Jacob Baines said. “Within days of the initial exploitation, we saw botnets, miners, and opportunistic scanners all adopting the same vulnerability.”

Source link

spot_img

Related articles

Best Organic Mattresses (2025): Birch, Avocado, Naturepedic, More

Organic bedding brand Coyuchi recently launched its own organic mattress, combining cotton, wool, and Dunlop latex atop individually...

Phundamental or pholly? – Sophos News

On paper, it sounds so simple: you prepare for the real thing by running simulations. After all, the...

MSI PRO B760M-P DDR4 ProSeries Motherboard Review

Key FeaturesLGA 1700 socketPCIe 4.0 supportDDR4 compatibilityM.2 slot presentGbps LAN includedUSB 3.2 Gen2Pros & ConsProsCompact designUSB-C portAffordable priceEasy...