CISA flags five newly exploited flaws affecting Apple, Craft CMS, and Laravel Livewire

March 20, 20262 min read2 sources
Share:
CISA flags five newly exploited flaws affecting Apple, Craft CMS, and Laravel Livewire

CISA has added five vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog after finding evidence of active exploitation, putting defenders on notice that the bugs are already being used in real attacks. The newly listed issues are CVE-2025-31277, a buffer overflow affecting multiple Apple products; CVE-2025-32432, a code injection flaw in Craft CMS; CVE-2025-43510, an improper locking issue affecting multiple Apple products; CVE-2025-43520, a classic buffer overflow in multiple Apple products; and CVE-2025-54068, a code injection flaw in Laravel Livewire.

CISA’s KEV Catalog is a priority remediation list used across government and widely followed by private-sector security teams. Inclusion means the agency has determined the vulnerabilities are not just severe on paper but are being exploited in the wild. Under Binding Operational Directive 22-01, federal civilian agencies must remediate KEV-listed flaws by CISA’s deadlines.

The mix of affected products broadens the risk. Three Apple entries suggest active exploitation against consumer and enterprise endpoints, though CISA’s alert does not include technical details on the affected components or attack chains. The two web application flaws may be especially urgent for internet-facing systems: code injection bugs in Craft CMS and Laravel Livewire can lead to server compromise, data theft, web shell deployment, or follow-on access into connected environments if left unpatched.

For defenders, the immediate priority is straightforward: identify exposed Apple devices and any deployments running Craft CMS or Laravel Livewire, apply vendor fixes, and review logs for signs of exploitation. Organizations that cannot patch immediately should restrict exposure where possible and monitor for suspicious administrative activity, unexpected file changes, and outbound connections from affected systems. Remote staff accessing sensitive systems should also use secure channels such as a VPN while incident response and patching are underway.

One caveat: the CISA alert confirms active exploitation and KEV inclusion, but fuller technical specifics, affected versions, and patch guidance should be verified through vendor advisories and the KEV entry itself. Even so, KEV status alone is enough to move these flaws to the top of patch queues.

Share:

// SOURCES

// RELATED

‘Copy Fail’ is a real Linux security crisis wrapped in AI slop

A critical, actively exploited Linux kernel flaw (CVE-2024-1086) allows root access, but the disclosure was marred by controversial AI-generated text.

6 min readMay 5

Nearly every Linux system built since 2017 vulnerable to ‘Copy Fail’ flaw

A critical flaw, CVE-2024-5219, in the Linux kernel since 2017 allows local attackers to gain root access. Admins are urged to patch immediately.

6 min readMay 2

A critical flaw in 911 systems could allow attackers to disrupt emergency services

A critical 9.8 CVSS vulnerability (CVE-2024-6074) in Intrado 911 gateways allows attackers to disrupt emergency services. Learn how to patch it.

6 min readApr 27

Former ransomware negotiator pleads guilty in BlackCat conspiracy, exposing a critical insider threat

A former ransomware negotiator has pleaded guilty to conspiring with the BlackCat group, using his insider knowledge to help them attack U.S. companie

7 min readApr 25