Botnet RondoDox Strikes Again: Unpatched XWiki Vulnerability Becomes Cyber Criminal’s Playground!
RondoDox, the botnet malware, is making waves by targeting unpatched XWiki instances. It’s exploiting the critical CVE-2025-24893 vulnerability, an eval injection bug. While some are mining cryptocurrency, RondoDox is busy recruiting devices for DDoS attacks. It’s like a talent scout, but for susceptible devices! Remember, patch it or regret it!

Hot Take:
Looks like the botnet world just got a new favorite dance move – the RondoDox Shuffle! While the rest of us are busy updating our software to avoid stepping on it, these cybercriminals are twirling through unpatched XWiki instances like they’re at a techno rave. Remember, folks, if you don’t want your server jiving to the beat of a DDoS attack or mining cryptocurrency like an overworked pickaxe, it’s time to patch those vulnerabilities faster than you can say “CVE-2025-24893!”
Key Points:
- RondoDox botnet is exploiting a critical vulnerability in XWiki.
- CVE-2025-24893 allows arbitrary code execution via the SolrSearch endpoint.
- The flaw was patched in February 2025, but exploitation continues.
- CISA has mandated federal agencies to mitigate the vulnerability by November 20.
- Multiple threat actors, including botnets and cryptocurrency miners, are targeting this vulnerability.
