Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack

Content
Key Insights
Key facts include active exploitation of critical flaws in Dassault Systèmes DELMIA Apriso (CVE-2025-6204 and CVE-2025-6205) and XWiki (CVE-2025-24893), with attacks traced to an IP in Vietnam and involving cryptocurrency miners.
Temporally, these exploits have been ongoing since early 2025, with escalated activity noted in the latter half of the year.
Stakeholders directly impacted include software vendors, federal agencies, and end-users of DELMIA Apriso and XWiki, while peripheral groups may comprise contractors and supply chains reliant on these platforms.
Immediate impacts involve unauthorized code execution and privilege escalation, leading to potential operational disruptions and resource hijacking.
Historically, these events resemble earlier cryptomining campaigns exploiting eval injection vulnerabilities, such as the 2023 XMRig outbreaks, demonstrating the enduring appeal of such attack vectors.
Looking ahead, optimistic scenarios involve improved patch management and threat detection tools reducing attack surfaces, whereas risk scenarios warn of increasingly sophisticated multi-stage attacks leveraging chained exploits.
From a regulatory perspective, priorities should focus on enforcing timely patch deployments, enhancing proactive threat intelligence sharing, and mandating comprehensive vulnerability assessments within affected sectors, balancing ease of implementation with substantial security benefits.