ADC

Signature update version 153

New signatures rules are generated for the vulnerabilities identified in the week 2025-06-02. You can download and configure these signature rules to protect your appliance from security vulnerable attacks.

Signature version

Signature version 153 applicable for Citrix ADC 12.1, Citrix ADC 13.0, NetScaler 13.1, NetScaler 14.1 platforms.

Note

Enabling Post body and Response body signature rules might affect NetScaler CPU.

Common Vulnerability Entry (CVE) insight

Following is a list of signature rules, CVE IDs, and its description.

Signature rule CVE ID Description
998291 CVE-2025-24801 WEB-MISC GLPI Prior to 10.0.18 - Unrestricted Upload of File Vulnerability (CVE-2025-24801)
998292 CVE-2025-2774 WEB-MISC Webmin Prior to 2.301 - Privilege Escalation Vulnerability (CVE-2025-2774)
998293 CVE-2025-24893 WEB-MISC xWiki Platform Multiple Versions - Remote Code Execution Vulnerability via /get (CVE-2025-24893)
998294 CVE-2025-24893 WEB-MISC xWiki Platform Multiple Versions - Remote Code Execution Vulnerability via /view (CVE-2025-24893)
998295 CVE-2024-9380 WEB-MISC Ivanti Cloud Services Application Prior to 5.0.2 - Remote Code Execution Vulnerability (CVE-2024-9380)
998296 CVE-2025-27007 WEB-WORDPRESS WordPress Plugin OttoKit Prior To 1.0.83 - Privilege Escalation Vulnerability Via rest (CVE-2025-27007)
998297 CVE-2025-27007 WEB-WORDPRESS WordPress Plugin OttoKit Prior To 1.0.83 - Privilege Escalation Vulnerability (CVE-2025-27007)
998298 CVE-2025-24799 WEB-MISC GLPI Prior to 10.0.18 - Unauthenticated SQL Injection Vulnerability via contact (CVE-2025-24799)
998299 CVE-2025-24799 WEB-MISC GLPI Prior to 10.0.18 - Unauthenticated SQL Injection Vulnerability via get_params (CVE-2025-24799)
Signature update version 153