Welcome to the CrowdSec VulnTracking Report. In these monthly reports, we explore key insights on emerging vulnerabilities and CVE exploitation trends, as spotted by the CrowdSec Network.
In September 2025, we added detection for 55 vulnerabilities and/or exploits to our database, translating them into scenarios for the CrowdSec Security Engine, AppSec rules for the CrowdSec WAF, and updated entries in our CTI.
DataCenter IPs are seven times more likely to be used to exploit known vulnerabilities than residential IPs.
Out of the tens of millions of IPs that we track every other month, a significant number are residential. According to various sources, more than 90% of all IPs fall into this category, which aligns with expectations.
What We Mean by āResidentialā
In our case, weāre defining residential IPs as IPs attributed to a household via an ISPās broadband/fibre /mobile network, as opposed to IP addresses assigned to a hosting provider, cloud provider, or colocation facility.
The Numbers Tell the Story
However, while more than 7% of tracked DataCenter IPs are actively (ie, last 15 days) exploiting known vulnerabilities, this number drops to below 1% for residential IPs. Yes, DataCenter IPs are seven times more likely to be used to exploit known vulnerabilities than residential IPs.
Why is that?
First of all, itās much (really a lot) more expensive to use residential IPs, most of which are rented via āresidential proxyā providers.
How much?
Well, Bright Data (the ābiggestā and āmost legitimateā Residential Proxy Providersānotice the quotes) charges around $4 per GB.Ā
Secondly, some of those providers perform KYC. Yes, while it might come as a surprise, the biggest names out there (such as Bright Data) are legitimate businesses with a āKnow Your Customerā process. They will clearly track potential abuse of their service and revoke customers’ accounts. On the other hand, a vast majority of DataCenter IPs ā especially those on the low-cost end ā completely ignore rampant abuse or even abuse reports.
Vulnerability signatures added to the CrowdSec database in September 2025
- WooCommerce Ultimate Gift Card – Arbitrary File Upload (CVE-2024-8425)Ā
- HP OfficeConnect Network Switches – Authentication Bypass (CVE-2022-37932)Ā
- XWiki-Platform – SQLi (CVE-2025-32969)Ā
- FreePBX – SQLi (CVE-2025-57819)Ā
- Cellinx NVT – Path Traversal (CVE-2023-23063)Ā
- GoAnywhere MFT – RCE (CVE-2023-0669)Ā
- MasaCMS – SQLi (CVE-2024-32640)Ā
- Jan – Arbitrary File Read (CVE-2024-36857)Ā
- Memos – XSS (CVE-2024-29029)Ā
- WP Fastest Cache – Arbitrary File Deletion (CVE-2020-36836)Ā
- jQuery File Upload Plugin – RCE (CVE-2014-8739)Ā
- Memos – SSRF (CVE-2024-29028)Ā
- LumisXP – XSS (CVE-2024-33326)Ā
- Opsview Monitor Pro – Path Traversal (CVE-2016-10367)Ā
- Frontend Login and Registration Blocks – Privilege Escalation (CVE-2025-3605)Ā
- Dell EMC iDRAC – RCE (CVE-2018-1207)Ā
- MapSVG – SQLi (CVE-2022-0592)Ā
- Oracle E-Business Suite – RCE (CVE-2025-61882)Ā
- Download Manager – RCE (CVE-2024-11740)Ā
- Memos – SSRF (CVE-2024-29030)Ā
- FortiSIEM – RCE (CVE-2025-25256)Ā
- Profile Builder Plugin – Authentication Bypass (CVE-2021-24527)Ā
- Images to WebP – Local File Inclusion (CVE-2021-24644)Ā
- D-Link – Information Disclosure (CVE-2020-25078)Ā
- Pivotal Spring Data REST and Spring Boot – RCE (CVE-2017-8046)Ā
- FortiWeb – Authentication Bypass (CVE-2025-52970)Ā
- Ultimate FAQs Plugin – XSS (CVE-2019-17233)Ā
- Eclipse Jetty – Information Disclosure (CVE-2021-28169)Ā
- Frontend File Manager Plugin – Authentication Bypass (CVE-2022-3124)Ā
- Photo Gallery by 10Web Mobile-Friendly Image Gallery – SQLi (CVE-2022-0169)Ā
- ND Booking – Authentication Bypass (CVE-2019-15774)Ā
- XWiki-Platform – Open Redirect (CVE-2025-32970)Ā
- XWiki-Platform – SQLi (CVE-2025-32429)Ā
- TP-Link – RCE (CVE-2023-33538)Ā
- XWiki-Platform – Information Disclosure (CVE-2025-46554)Ā
- Rank Math Plugin – Redirect Creation (CVE-2020-11515)Ā
- NetAlertX – Authentication Bypass (CVE-2024-46506)Ā
- Hunk Companion – Missing Authorization (CVE-2024-11972)Ā
- XWiki-Platform – Information Disclosure (CVE-2025-29925)Ā
- MagicINFO 9 Server – Path Traversal (CVE-2025-4632)Ā
- Linear eMerge E3-Series – SQLi (CVE-2022-38627)Ā
- Letta – RCE (CVE-2025-51482)Ā
- XWiki-Platform – RCE (CVE-2024-21650)Ā
- Skyvern – RCE (CVE-2025-49619)Ā
- SmartDataSoft SmartBlog for PrestaShop – SQLi (CVE-2021-37538)Ā
- MikoPBX – Path Traversal (CVE-2025-52207)Ā
- Contact Form Plugin – Authorization Bypass (CVE-2024-2782)Ā
- Ivanti Connect Secure – RCE (CVE-2025-22457)Ā
- LiteSpeed Cache – Privilege Escalation (CVE-2024-28000)Ā
- Popup Builder – XSS (CVE-2023-6000)Ā
- MCP Inspector – Authentication Bypass (CVE-2025-49596)Ā
- Vitogate 300 Firmware – RCE (CVE-2023-45852)Ā
- Unity – RCE (CVE-2025-36604)Ā
- SAP NetWeaver – Arbitrary File Upload (CVE-2025-42922)Ā
- Rank Math Plugin – Privilege Escalation (CVE-2020-11514)Ā