Top CVEs in Australia – July 2025: What You Need to Patch Now

🧠 Introduction

July 2025 saw a sharp spike in critical cybersecurity vulnerabilities exploited (CVEs) in the wild — with several affecting commonly used platforms in Australian businesses, such as Microsoft SharePoint, Google Chrome, and Fortinet systems.

Using data from the CISA Known Exploited Vulnerabilities Catalog, we’ve analysed the top CVEs added in July 2025 and identified those that pose the greatest risk to Australian networks.

This list is especially relevant for SMEs, MSPs, and IT leaders responsible for patching enterprise and customer-facing applications.

📊 Top Exploited CVEs – July 2025

Here’s a breakdown of the most critical CVEs with confirmed exploitation in the wild, sorted by severity and relevance to Australian infrastructure:

CVE IDVendorProductVulnerability TypeCWEDate AddedDue Date
25-49704MicrosoftSharePointCode InjectionCWE-942025-07-222025-07-23
25-49706MicrosoftSharePointImproper AuthenticationCWE-2872025-07-222025-07-23
25-53770MicrosoftSharePointDeserialization of Untrusted DataCWE-5022025-07-212025-07-23
25-6558GoogleChromiumImproper Input ValidationCWE-202025-07-222025-08-12
25-54309CrushFTPCrushFTPAlternate Channel AccessCWE-4202025-07-222025-08-12
25-25257FortinetFortiWebSQL InjectionCWE-892025-07-182025-08-04
25-5777CitrixNetScaler ADC & GatewayOut-of-Bounds ReadCWE-1252025-07-102025-07-25
25-48928TeleMessageTM SGNLCode Dump ExposureCWE-5282025-07-012025-07-23

💡 CWE refers to the Common Weakness Enumeration system used to classify software vulnerabilities by type.

📈 Analysis & Trends

  • Microsoft SharePoint vulnerabilities dominated July’s list, with three different CVEs affecting various layers of its authentication and deserialization logic — indicating it’s a high-value target for attackers.
  • Web-facing applications (SharePoint, FortiWeb, Chromium, CrushFTP) made up over 70% of the list, reinforcing the need for hardened perimeter defenses.
  • All vulnerabilities listed are actively being exploited, meaning attackers are using them in real-world attacks — not theoretical exploits.

🔧 What Should Australian Organisations Do?

If your infrastructure includes any of the above software, you should:

  1. Apply patches immediately – All of these CVEs have recommended vendor mitigations available now.
  2. Audit public-facing assets – Use tools like Shodan or Censys to check exposure of systems like CrushFTP or SharePoint.
  3. Review internal access controls – Many CVEs involve privilege escalation or improper access logic (e.g., CWE-287, CWE-420).
  4. Monitor logs and network traffic – Look for indicators of compromise tied to each vendor’s advisories (see links below).
  5. Educate your security team – Stay current on KEV additions using RSS or email updates from CISA.

🔗 Resources

Your next read: Kaspersky Antivirus Free: The Ultimate Guide for 2025