On January 22, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, indicating they are being actively exploited by malicious actors. The vulnerabilities impact a wide array of technologies: Synacor Zimbra Collaboration Suite (ZCS), the Vite frontend development tool, the Versa Concerto SD-WAN platform, and the popular 'eslint-config-prettier' NPM package. The inclusion in the KEV catalog triggers a binding operational directive requiring U.S. federal agencies to remediate the flaws by February 12, 2026. Given the confirmed in-the-wild exploitation, private sector organizations are strongly advised to follow suit and patch these vulnerabilities immediately to prevent system compromise, data disclosure, and further network intrusion.
The four vulnerabilities added to the KEV catalog represent distinct threats to different parts of the IT environment:
CVE-2025-68645: A Local File Inclusion (LFI) vulnerability in the webmail UI of Zimbra Collaboration Suite. This flaw allows an unauthenticated attacker to include and view arbitrary files from the WebRoot directory, potentially exposing sensitive configuration data, internal paths, and other information useful for reconnaissance. Security firm CrowdSec has reported a recent surge in exploitation.
CVE-2025-31125: An improper access control vulnerability in the Vite frontend development framework. It allows unauthorized access to the content of files that should be restricted, affecting applications that expose the Vite development server directly to the network.
CVE-2025-34026: An authentication bypass vulnerability in the Versa Networks Concerto SD-WAN orchestration platform. Successful exploitation could grant an attacker unauthorized access to the platform, potentially allowing them to manipulate network configurations and traffic.
CVE-2025-54313: A malicious code execution vulnerability within the eslint-config-prettier NPM package. Malicious versions of this package contain an install.js script that executes a malware payload (node-gyp.dll) on Windows systems during the package installation process, representing a software supply chain threat.
eslint-config-prettier NPM package.All four vulnerabilities are confirmed by CISA to be under active exploitation in the wild. The directive for federal agencies to patch by February 12, 2026, underscores the urgency. The exploitation of the Zimbra flaw has been described as part of sophisticated campaigns, while the eslint-config-prettier vulnerability is a classic supply chain attack targeting developers.
Exploitation of these vulnerabilities can lead to severe consequences:
Security teams should hunt for signs of compromise related to these vulnerabilities:
| Type | Value | Description |
|---|---|---|
| url_pattern | /?/!/ |
Pattern observed in web server logs indicating attempts to exploit the Zimbra LFI (CVE-2025-68645). |
| file_name | install.js |
Suspicious installation script within node_modules/eslint-config-prettier. |
| file_name | node-gyp.dll |
Malicious payload dropped by the compromised NPM package (CVE-2025-54313). |
| url_pattern | /api/v1/device/ |
Potential endpoint to monitor for anomalous requests related to Versa Concerto (CVE-2025-34026). |
Defenders should implement the following detection strategies:
../. For Versa Concerto, monitor for unauthorized access attempts to the management interface from unknown IP addresses.install.js in the eslint-config-prettier package directory. Use file hashing (D3-FH) to compare package lock files against known-good versions.node-gyp.dll or any DLL being launched by node.exe or npm.exe processes, particularly in the context of package installation.Immediate action is required to mitigate these threats:
eslint-config-prettier package to a safe version. This aligns with MITRE mitigation M1051 - Update Software.M1035 - Limit Access to Resource Over Network.eslint-config-prettier are in use. Implement dependency scanning tools in the CI/CD pipeline.M1047 - Audit.The most critical mitigation is to apply the security patches provided by the respective vendors to eliminate the vulnerabilities.
Mapped D3FEND Techniques:
As a compensating control, restrict network access to vulnerable systems like Zimbra and Versa Concerto management interfaces, allowing connections only from trusted internal IP ranges.
Mapped D3FEND Techniques:
Implement comprehensive logging and auditing for web servers and applications to detect and investigate potential exploitation attempts.
Mapped D3FEND Techniques:
Use a Web Application Firewall (WAF) to filter malicious requests targeting the Zimbra vulnerability before they reach the server.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats