CVE-2025-27867
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Felix HTTP Webconsole Plugin. This issue affects Apache Felix HTTP Webconsole Plugin: from Version 1.X through 1.2.0. Users are recommended to upgrade to version 1.2.2, …
This vulnerability can be exploited remotely without credentials or user interaction. Until patched: block access to the affected service from the internet using firewall rules or ACLs. Only allow access from trusted IPs.
Log in to wp-admin → Dashboard → Updates. Update WordPress core first, then all plugins and themes. If a specific plugin is named in the CVE, update or deactivate it immediately. Consider a WAF (Cloudflare, Wordfence) as an additional layer.
Apply the patched version from the vendor's official release channel. For Apache: check httpd.apache.org/security. For Nginx: check nginx.org/en/security_advisories.html. After updating, verify the server config for any deprecated directives.
SMB Attack Probability Score weights: EPSS exploit likelihood (35%), CISA KEV active exploitation (25%), SMB stack prevalence (20%), exploit maturity (10%), CVSS network vector complexity (10%). Impact scenarios are derived from software category and historical SMB incident patterns. Scores recompute daily.