ADC

Signature update version 162

New signatures rules are generated for the vulnerabilities identified in the week 2025-10-01. You can download and configure these signature rules to protect your appliance from security vulnerable attacks.

Signature version

Signature version 162 applicable for Citrix ADC 12.1, Citrix ADC 13.0, NetScaler 13.1, NetScaler 14.1 platforms.

Note

Enabling Post body and Response body signature rules might affect NetScaler CPU.

Common Vulnerability Entry (CVE) insight

Following is a list of signature rules, CVE IDs, and its description.

Signature rule CVE ID Description
998222 CVE-2025-32429 WEB-MISC XWiki Multiple Versions - SQL Injection Vulnerability (CVE-2025-32429)
998223 CVE-2025-53693 WEB-MISC SiteCore Up to 10.4 - Unauthenticated Unsafe Reflection Vulnerability (CVE-2025-53693)
998224 CVE-2025-34509 WEB-MISC SiteCore Up to 10.4 - Hardcoded ServicesAPI Credential via ItemService (CVE-2025-34509)
998225 CVE-2024-55661 WEB-MISC Laravel Pulse Prior to 1.3.1 - Code Injection Vulnerability (CVE-2024-55661)
998226 CVE-2025-57788 WEB-MISC Commvault Multiple Versions - Unauthorized API Access Vulnerability via EventOrganizerPublicUser (CVE-2025-57788)
998227 CVE-2025-57788 WEB-MISC Commvault Multiple Versions - Unauthorized API Access Vulnerability via PublicSharingUser (CVE-2025-57788)
998228 CVE-2025-24000 WEB-WORDPRESS Post SMTP Prior To 3.3.0 - Authentication Bypass Vulnerability via rest_route (CVE-2025-24000)
998229 CVE-2025-24000 WEB-WORDPRESS Post SMTP Prior To 3.3.0 - Authentication Bypass Vulnerability via URL (CVE-2025-24000)
Signature update version 162