Programmer’s Digest #146
08/01/2025-08/07/2025 Apex One Flaws Exploted in the Wild, NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code, Malicious AI-generated npm Package Hits Solana Users And More.
1. Trend Micro Apex One Flaws Exploted in the Wild (CVE-2025-54948, CVE-2025-54987)
Trend Micro has warned of two unauthenticated command injection vulnerabilities (CVE-2025-54948, CVE-2025-54987) affecting its on-premise Apex One endpoint security platform. These flaws, which could lead to remote code execution, are currently under active investigation following reports of attempted exploitation. A full patch is expected mid-August 2025, but a temporary “fix tool” is available. It mitigates the risk but disables the Remote Install Agent function; other install methods remain unaffected.
The flaws exist in the Apex One console (TCP ports 8080 and 4343) due to improper input validation. They affect versions 20216 and below, as well as Management Server Version 14039 and earlier. Mitigations for cloud versions were deployed on July 31. The flaws require console access, so Trend Micro urges organizations to restrict exposure and apply the fix immediately—followed by the patch when released.
2. NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers
Multiple security flaws have been discovered in NVIDIA’s Triton Inference Server for Windows and Linux, potentially allowing remote, unauthenticated attackers to take full control of affected systems. The open-source platform, used for running AI models, is vulnerable to remote code execution (RCE), denial of service, and data tampering.
Three key CVEs (CVE-2025-23319, CVE-2025-23320, CVE-2025-23334) impact the Python backend, which handles inference requests for AI frameworks like PyTorch and TensorFlow. Chained together, these bugs could leak internal memory details and lead to a complete server compromise.
Wiz researchers demonstrated how an attacker could exploit these flaws without credentials, posing serious risks such as model theft, AI response manipulation, and network infiltration.
NVIDIA has patched the issues in version 25.07 and also addressed additional critical bugs (CVE-2025-23310, CVE-2025-23311, CVE-2025-23317) related to unsafe HTTP request handling. Users are strongly urged to update to stay protected.
3. Malicious AI-generated npm Package Hits Solana Users
An AI-generated npm package, @kodane/patch-manager, was flagged for draining Solana wallets and removed after over 1,500 downloads on July 28, 2025. Disguised as a “Registry Cache Manager,” it hid malicious scripts that targeted macOS, Linux, and Windows systems. It used postinstall scripts to hide files and established persistence through a background script (connection-pool.js) connecting to an open C2 server. Once wallets were found, a second script (transaction-cache.js) drained funds to a hardcoded Solana address.
The malware, uploaded by a user named “Kodane,” had 19 versions published in just two days. Despite its malicious purpose, the package had polished documentation and code, likely AI-generated. Cybersecurity firm Safety noted patterns typical of AI tools like Claude, such as excessive logs, emojis, and frequent use of terms like “Enhanced.” Analysts believe AI was used to make the code look professional and trustworthy, increasing download rates before discovery.
4. Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install
A critical vulnerability (CVE-2025-5394) in the Alone – Charity Multipurpose Non-profit WordPress Theme is being actively exploited to hijack websites. Rated 9.8 on the CVSS scale, the flaw affects all versions up to 7.8.3 and was patched in version 7.8.5 on June 16, 2025. The issue stems from a missing capability check in the alone_import_pack_install_plugin() function. This allows unauthenticated users to upload arbitrary plugins via AJAX, enabling remote code execution and full site takeover. Exploitation began on July 12, ahead of public disclosure, suggesting attackers may have monitored code changes. Wordfence reports over 120,000 blocked exploit attempts, many deploying ZIP archives containing PHP backdoors to run remote commands or create rogue admin accounts. Admins using the theme should immediately update, review admin users, and scan for suspicious AJAX requests to /wp-admin/admin-ajax.php?action=alone_import_pack_install_plugin.