{"id":6778,"date":"2026-01-23T16:26:56","date_gmt":"2026-01-23T16:26:56","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/01\/23\/cisa-updates-kev-catalog-with-four-actively-exploited-software-vulnerabilities\/"},"modified":"2026-01-23T16:26:56","modified_gmt":"2026-01-23T16:26:56","slug":"cisa-updates-kev-catalog-with-four-actively-exploited-software-vulnerabilities","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/01\/23\/cisa-updates-kev-catalog-with-four-actively-exploited-software-vulnerabilities\/","title":{"rendered":"CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities"},"content":{"rendered":"<p>\u200bThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.<br \/>\nThe list of vulnerabilities is as follows &#8211;<\/p>\n<p>CVE-2025-68645 (CVSS score: 8.8) &#8211; A PHP remote file inclusion vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that could allow a\u00a0The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.<br \/>\nThe list of vulnerabilities is as follows &#8211;<\/p>\n<p>CVE-2025-68645 (CVSS score: 8.8) &#8211; A PHP remote file inclusion vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that could allow a\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows &#8211; CVE-2025-68645 (CVSS score: 8.8) &#8211; A PHP remote file inclusion vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2026\/01\/23\/cisa-updates-kev-catalog-with-four-actively-exploited-software-vulnerabilities\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":6779,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6778"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=6778"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/6778\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/6779"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=6778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=6778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=6778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}