CISA Warns of Active Exploits in DELMIA Apriso, XWiki Flaws

Active Exploitation of Critical Vulnerabilities in Dassault Systèmes DELMIA Apriso and XWiki Enables Remote Code Execution and Cryptocurrency Mining Campaigns

  • Threat actors are exploiting vulnerabilities in Dassault Systèmes DELMIA Apriso and XWiki.
  • CVE-2025-24893 in XWiki enables remote code execution by any guest user.
  • CVE-2025-6204 and CVE-2025-6205 affect DELMIA Apriso versions from 2020 to 2025 and allow code injection and privilege escalation.
  • Exploitation attempts include delivering cryptocurrency miners and disabling competing Malware.
  • Users are urged to apply security updates promptly, with some agencies required to patch by November 18, 2025.

Threat actors are actively exploiting multiple security flaws found in Dassault Systèmes DELMIA Apriso and XWiki, according to alerts from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and VulnCheck. The vulnerabilities allow remote code execution and unauthorized access.

- Advertisement -

Specifically, CVE-2025-6204 is a code injection vulnerability with a CVSS score of 8.0, and CVE-2025-6205 is a missing authorization flaw with a score of 9.1, both impacting DELMIA Apriso releases from 2020 through 2025. These were patched by the vendor in early August. Meanwhile, CVE-2025-24893, rated 9.8, is an eval injection in XWiki allowing any guest user to execute arbitrary code through the “/bin/get/Main/SolrSearch” endpoint.

VulnCheck reported that CVE-2025-24893 is exploited in a two-stage attack delivering cryptocurrency mining malware. The attacker first stages a downloader, which retrieves further payloads including a miner and a tool to remove competing malware like XMRig and Kinsing. The attack traffic originates from an IP address in Vietnam flagged for malicious activity, according to AbuseIPDB.

“We observed multiple exploit attempts against our XWiki canaries coming from an attacker geolocated in Vietnam,” said VulnCheck’s Jacob Baines. “The exploitation proceeds in a two-pass workflow separated by at least 20 minutes: the first pass stages a downloader (writes a file to disk), and the second pass later executes it.”

The vulnerabilities have been added recently to the Known Exploited Vulnerabilities catalog. Active exploitation follows earlier attacks targeting a separate critical flaw in DELMIA Apriso, reported in September. Civilian Executive Branch agencies are required to remediate the DELMIA Apriso flaws by November 18, 2025. Users are advised to apply updates promptly to reduce risk.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Capital One to Buy Brex for $5.15B; Cards Interest Boost now

Capital One will buy Brex for $5.15 billion in a deal set to close...

Sen. Lummis says CLARITY Act unites crypto, urges quick vote

Senator Cynthia Lummis says renewed alignment across the crypto industry has boosted momentum for...

Negative XRP Funding Mirrors Past Setups Ahead of Rally Soon

XRP perpetual funding rates on Binance have been negative recently, signaling a bearish derivatives...

XRP Drops to $1.91 After Rally; $2.60 Target Looks Unlikely.

XRP rose to $2.39 on Jan. 6, 2026, then fell to $1.91 and is...

Ethereum Breaks Support; Bitcoin Fades Altcoins Mostly Muted

Ethereum fell toward $2,900 after losing support at $3,170–$3,200, pushing heavy liquidations.Total market liquidations...
- Advertisement -

Must Read

How to Set Up a Simple Bitcoin Tip Jar for Your Site or Stream

QUICK LINKSWhat a tip jar is, in plain wordsWhat you needBuild a payment link that just worksAdd a QR code that actually scansWhere to...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!