Cybercriminals Exploit Zero-Day Flaws in VeraCore Supply Chain Software

Article Highlights
Off On

In a worrying development for the cybersecurity world, two zero-day vulnerabilities were recently uncovered in VeraCore, a warehouse management software platform. Cybercriminals known as the XE Group exploited these flaws to carry out supply chain attacks. The company behind VeraCore, Advantive, is currently grappling with the repercussions of these breaches, especially given the persistence and sophistication shown by the XE Group. The vulnerabilities, classified as CVE-2024-57968 and CVE-2025-25181, pose significant risks to the affected systems and organizations.

Discovery of Critical Zero-Day Vulnerabilities

CVE-2024-57968: Severe Upload Validation Flaw

Researchers from Intezer and Solis Security exposed the alarming presence of CVE-2024-57968, a severe upload validation flaw with a daunting CVSS score of 9.9. This flaw, if unmitigated, allows unauthorized individuals to upload potentially harmful files. The researchers demonstrated how easily the XE Group could manipulate this security gap to gain unauthorized access. The group exploited this vulnerability, specifically targeting hosting servers running VeraCore on Microsoft Internet Information Services (IIS) systems.

This high-severity flaw permits attackers to upload arbitrary files to specific directories without any form of validation. Consequently, these files can contain malicious scripts that compromise the core operations of the server. The ease with which this flaw can be used emphasizes the urgent need for software providers to conduct thorough vulnerability assessments regularly. The XE Group’s successful exploitation of CVE-2024-57968 serves as a stark reminder of how zero-day vulnerabilities can be utilized for prolonged attacks.

CVE-2025-25181: Medium-Severity SQL Injection Flaw

The second flaw, designated CVE-2025-25181, is a medium-severity SQL injection vulnerability, holding a CVSS score of 5.8. This flaw facilitates unauthorized access to database information, leading to a critical data breach if unchecked. The XE Group allegedly took advantage of this vulnerability as early as January 2020. Using SQL injection attacks, they managed to infiltrate the IIS server’s database system, deploying customized webshells for continuous access.

These webshells enabled the cybercriminals to establish backdoors, maintaining their presence in the affected systems for extended periods. Researchers noted that the XE Group’s strategic use of webshells, combined with their knowledge of SQL vulnerabilities, underscores their sophisticated approach. It is particularly alarming that the group managed to maintain access to an organization for more than four years, setting a dangerous precedent for future cybersecurity threats.

Response and Impact on VeraCore

Advantive’s Temporary Fix and Security Measures

In response to these discoveries, Advantive swiftly released a temporary fix aimed at neutralizing CVE-2024-57968 by removing the vulnerable upload feature. This move is part of a broader effort to secure existing systems immediately. However, there is ambiguity regarding any patch or solution addressing CVE-2025-25181. The company has also assured its users that as of now, there are no known active threats targeting VeraCore software, although security evaluations are ongoing.

The hastening release of temporary fixes, while necessary, underscores a deeper issue within software development: the struggle to balance rapid response with comprehensive solutions. Continuous updates, vigilance, and proactive security measures must become intrinsic components of the development and deployment stages to ensure such flaws do not remain for future exploits.

The Rising Threat in Supply Chain Cybersecurity

The XE Group, a cybercriminal organization, exploited these flaws to execute supply chain attacks, highlighting the increasing sophistication and persistence of cyber threats today. Advantive, the company responsible for VeraCore, is facing significant challenges due to these breaches. The specific vulnerabilities, tagged as CVE-2024-57968 and CVE-2025-25181, represent serious threats to the systems and organizations reliant on VeraCore’s software. These vulnerabilities could potentially allow unauthorized access and manipulation of critical data, putting both the integrity of supply chains and sensitive information at risk. The discovery of these flaws not only underscores the importance of robust cybersecurity measures but also signals a pressing need for continued vigilance and prompt action to mitigate risks in the ever-evolving landscape of cyber warfare.

Explore more

The Rise of Intent-Based Data Engineering and AI Agents

The persistent friction between a business leader’s vision and the technical execution of a data pipeline has long been the primary cause of organizational stagnation in a rapidly digitizing economy. For years, the industry operated within a “translation loop,” a cumbersome process where high-level strategic goals were decomposed into granular, rigid technical tickets. This manual hand-off often resulted in a

AskNicely Unifies Customer Feedback and Online Reviews

The hidden disconnect between the private praise received in survey boxes and the public criticism found on search engines has become a silent predator for service businesses everywhere. In the current service economy, a business often lives two separate lives: the one documented in internal Net Promoter Score (NPS) surveys and the one broadcasted to the public on Google and

B2B Benchmark Survey Explores the Future of ABM and AI

Modern marketing departments frequently describe their operations as fully automated, yet many organizations continue to struggle when translating sophisticated algorithms into consistent revenue growth. While the promise of artificial intelligence offers a competitive edge, the gap between experimental pilots and scalable account-based success is widening. This year’s intelligence initiative arrives at a pivotal moment, moving past industry buzzwords to uncover

Best Email Marketing Platforms for Nigerian SMBs in 2026

The rapid shift toward decentralized digital landscapes has transformed the humble email inbox into a premium storefront where Nigerian entrepreneurs command absolute authority over their brand narratives. While social media platforms grapple with unpredictable algorithm shifts and dwindling organic reach, the direct connection established through an email address remains the most stable asset in a digital portfolio. This resilience proves

Is Your Marketing Automation Overloaded or Systematic?

Marketing operations professionals frequently discover that the digital engines once built to accelerate every campaign have silently transformed into a sprawling labyrinth where every modification feels like a struggle against an invisible and suffocating gravity. This creeping dread often manifests during a standard campaign launch—a process that should reasonably take minutes but instead stretches into hours of exhaustive troubleshooting and