Curated Content | Thought Leadership | Technology News

Critical Vulnerabilities in Erlang/OTP and Roundcube Now Being Exploited

Bugging out.
David Eberly
Contributing Writer
Beetle crawling across screen

On June 10, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) expanded its Known Exploited Vulnerabilities (KEV) catalog to include two high-severity flaws targeting the Erlang/OTP SSH server and the Roundcube webmail client.

This confirms that active exploitation is happening, and it’s a clear signal for government systems and any connected infrastructure to move quickly to reduce the risk.

The vulnerabilities in question are capable of enabling unauthenticated remote code execution (RCE) and cross-site scripting (XSS)-based email exfiltration, respectively. Their addition to the KEV list triggers a mandatory remediation timeline for federal civilian executive branch (FCEB) systems, with a compliance deadline of June 30, 2025.

However, for any organization managing distributed architectures or legacy messaging interfaces, these issues should be considered immediate priorities regardless of regulatory mandate.

Why It Matters: This is a reminder of how quickly exploit code can move from disclosure to weaponization, particularly in widely deployed or niche-adjacent services like Erlang’s SSH stack or Roundcube’s PHP mail viewer. While neither platform dominates today’s mainstream stack, their presence in telecom, embedded systems, and SME infrastructure means they often escape visibility until they’re already exploited.

The RCE vulnerability in Erlang is particularly concerning given its unauthenticated nature, while the Roundcube XSS flaw reflects a continuing trend of client-side injection attacks being used for credential harvesting and covert surveillance-tactics favored by advanced persistent threat (APT) groups.

  • CVE-2025-32433 – Erlang/OTP SSH Vulnerability (CVSS 10.0): A critical logic flaw in Erlang’s SSH server permits remote code execution without authentication. This flaw, patched in April 2025 (OTP-27.3.3, OTP-26.2.5.11, OTP-25.3.2.20), enables adversaries to bypass login checks entirely and issue system-level commands. With PoC exploits already circulating, perimeter-facing Erlang instances, especially in telco or distributed compute environments, should be assumed vulnerable.
  • CVE-2024-42009 – Roundcube Webmail XSS (CVSS 9.3): A reflected XSS vulnerability in mail/show.php allows attackers to trigger malicious script execution by delivering a specially crafted email to a target. Once triggered, it could exfiltrate email content or initiate actions on the user’s behalf. The issue was resolved in August 2024 (versions 1.6.8 and 1.5.8), but exploitation has continued.
  • Compliance-Driven Deadline for Federal Systems: Agencies within the FCEB have until June 30, 2025 to apply mitigation or patching as part of Binding Operational Directive 22-01. While this directive applies only to U.S. government systems, organizations operating in adjacent sectors (e.g., defense contractors, telecom, healthcare) would be prudent to treat this deadline as best practice.
  • Exploit Availability and Active Reconnaissance: Public proof-of-concept code has been released for the Erlang flaw, and Censys has identified over 300 potentially exposed instances. While this number may include false positives, the combination of confirmed exploitation and tool availability significantly elevates the operational risk.
  • Related Vulnerability: WordPress Plugin Exploit: Separately, Patchstack has reported an unauthenticated account takeover vulnerability (CVE-2025-31022, CVSS 9.8) in the PayU CommercePro plugin, affecting versions 3.8.5 and earlier. Exploitation hinges on predictable token behavior tied to a hardcoded service email. Until a fix is released, organizations are advised to disable or remove the plugin entirely.

Go Deeper → CISA Adds Two Known Exploited Vulnerabilities to Catalog – CISA

CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog – The Hacker News

☀️ Subscribe to the Early Morning Byte! Begin your day informed, engaged, and ready to lead with the latest in technology news and thought leadership.

☀️ Your latest edition of the Early Morning Byte is here! Kickstart your day informed, engaged, and ready to lead with the latest in technology news and thought leadership.

ADVERTISEMENT

×
You have free article(s) left this month courtesy of CIO Partners.

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Would You Like To Save Articles?

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Thanks for subscribing!

We’re excited to have you on board. Stay tuned for the latest technology news delivered straight to your inbox.

Save My Spot For TNCR LIVE!

Thursday April 18th

9 AM Pacific / 11 PM Central / 12 PM Eastern

Register for Unlimited Access

Already a member?

Digital Monthly

$12.00/ month

Billed Monthly

Digital Annual

$10.00/ month

Billed Annually

Would You Like To Save Books?

Enter your username and password to access premium features.

Don’t have an account? Join the community.

Log In To Access Premium Features

Sign Up For A Free Account

Please enable JavaScript in your browser to complete this form.
Name
Newsletters