Welcome to the CrowdSec VulnTracking Report. In these monthly reports, we are exploring key insights on emerging vulnerabilities and CVE exploitation trends, as spotted by the CrowdSec Network.
In March 2025, we added detection for 55 vulnerabilities and/or exploits to our database, translating them into scenarios for the CrowdSec Security Engine, AppSec rules for the CrowdSec WAF, and updated entries in our CTI.
Industrialisation efforts — and LLMs, let’s not lie — allow us to significantly increase the pace at which we can track new vulnerabilities (+61% month over month).
The yearly Verizon DBIR and VulnCheck Quarterly reports are out, and cross-reading highlights consistent patterns.
Expectation vs. reality
Verizon points out that vulnerability exploitation and credential abuse (including brute force) have increased, while SE has decreased slightly. At the same time, VulnCheck shows that nearly a third of vulnerabilities are reported as being exploited in the wild within one day of their disclosure.
This sub-24-hour metric isn’t overstated; the latest SAP NetWeaver (CVE-2025-31324) vulnerability shows it:
- CVE published on Thursday, 24th
- By Friday morning, without a public PoC, we had already identified several IPs exploiting it in the wild.
- By Monday morning, still without a reliable public PoC, we identified more than 40 IPs exploiting it at scale.
On the other hand, DBIR points out a median delay of 32 to 38 days for complete remediation of disclosed vulnerabilities.
This shrinkage of the time needed to weaponize vulnerabilities can be attributed to many factors. Still, the increasingly realistic ability of LLMs and newer models to produce reliable exploitation code is not to be underestimated, as highlighted in the recent CrowdSec Multimodal Offensive AI ebook.
To state the obvious, it means that attackers have plenty of time to exploit publicly disclosed vulnerabilities before organisations can patch them. The most worrying part is that the increased targeting of edge devices, namely VPNs and firewalls, makes the exercise even harder, as they are harder to virtual patch and are often not as well integrated into the security ecosystem — for example, EDRs, forensic collection, and post-exploitation detection.
Can we expect organisations to patch within 24h?
Certainly not for the majority of cases.
Are we facing a no-win scenario?
Not necessarily.
Over the last three months, out of the hundred CVEs CrowdSec started tracking, 67% of IPs exploiting those new vulnerabilities were already well known from the CrowdSec CTI. Yes, most attackers will maintain infrastructure over time, which can be used to our advantage. Also, nearly 30% of IPs were already part of the CrowdSec Blocklists before they even started exploiting those new vulnerabilities.
Vulnerability signatures added to the CrowdSec database in April 2025
- CVE-2021-43798: Grafana – Path Traversal
- CVE-2002-1131: SquirrelMail – Cross-site scripting
- CVE-2007-0885: Rainbow Zen – Cross-site scripting
- CVE-2021-26294: AfterLogic Aurora – Directory Traversal
- CVE-2021-26084: Confluence data center – SQLi
- CVE-2022-27925: Zimbra Collaboration – RCE
- CVE-2025-31324: SAP NetWeaver – RCE
- CVE-2023-46805: Ips – Authentication Bypass
- CVE-2017-1000170: jqueryFileTree – Directory Traversal
- CVE-2024-21887: Ivanti CPS – RCE
- CVE-2022-1388: BIG-IP – Authentication Bypass
- CVE-2021-44529: Ivanti EPM – RCE
- CVE-2024-57727: SimpleHelp – Path Traversal
- CVE-2025-24893: XWiki – RCE
- CVE-2018-16836: Rubedo – Directory Traversal
- CVE-2023-0297: Pyload/pyload – RCE
- CVE-2024-27292: Docassemble – Path Traversal
- CVE-2024-20439: Cisco smart license utility – Authentication Bypass
- CVE-2021-40539: Zoho ManageEngine ADSelfService Plus – Authentication Bypass
- CVE-2024-20440: Cisco smart license utility – Information Disclosure
- CVE-2023-36844: Junos OS – RCE
- CVE-2024-1709: Screenconnect – Authentication Bypass
- CVE-2022-26833: Oas platform – Authentication Bypass
- CVE-2020-9054: Zyxel NAS – RCE
- CVE-2021-21234: Spring-boot-actuator-logview – Path Traversal
- CVE-2023-6875: WordPress POST SMTP Mailer – Authorization Bypass
- CVE-2022-31656: Vmware Workspace ONE – Authentication Bypass
- CVE-2024-27564: dirk1983/chatgpt – RCE
- CVE-2025-2748: Kentico Xperience – RCE
- CVE-2015-4455: Aviary Image Editor – RCE
- CVE-2018-17431: Comodo UTM Firewall – RCE
- CVE-2023-48084: Nagios XI – SQLi
- CVE-2024-52763: Ganglia Web – XSS
- CVE-2023-36845: Junos OS – RCE
- CVE-2023-47105: ChaosBlade – RCE
- CVE-2019-16996: Metinfo – SQLi
- CVE-2021-31589: BeyondTrust – XSS
- CVE-2022-1221: Gwyn’s imagemap selector – XSS
- CVE-2018-12998: Zoho Manage Engine – XSS
- CVE-2021-24498: Calendar event multi view – XSS
- CVE-2023-34993: Fortiwlm – SQLi
- CVE-2023-3519: NetScaler Gateway – RCE
- CVE-2025-29306: FoxCMS – RCE
- CVE-2025-31161: CrushFTP – Authentication Bypass
- CVE-2024-25600: Bricks builder – RCE
- CVE-2025-34028: Commvault Command Center Innovation Release – Path Traversal
- CVE-2025-28367: mojoPortal BetterImageGallery – Path Traversal
- CVE-2024-32870: Itop – SQLi
- CVE-2024-21762: FortiOS – RCE
- CVE-2025-24016: Wazuh – RCE
- CVE-2024-23113: FortiProxy – RCE
- CVE-2024-28995: Solarwinds Serv-U – Path Traversal
- CVE-2016-10924: Ebook Download Plugin – Path Traversal
- CVE-2022-23347: BigAnt Software BigAnt Server – Path Traversal
- YonYou SQLi: UFIDA U8 CRM cfillbacksetting.php – SQL Injection