Detection for CVE-2025-8875 & CVE-2025-8876


Over the past few weeks, two critical vulnerabilities - CVE-2025-8875 and CVE-2025-8876 have surfaced as active threats in the wild. Both have been flagged by CISA as being widely exploited, and organisations relying on N-able N-central are particularly at risk.
What Are These Vulnerabilities?
CVE-2025-8875
A critical flaw in N-able N-central that stems from improper handling of untrusted data. It allows remote attackers to exploit deserialization weaknesses and potentially execute arbitrary code on the affected system.
CVE-2025-8876
Closely related, this vulnerability involves a Deserialization of Untrusted Data issue in N-central, which leads to local execution of code. Versions of N-central before 2025.3.1 are impacted. If left unpatched, attackers can leverage this flaw to gain control of systems running vulnerable deployments.
Both vulnerabilities present high-impact attack vectors — exploitation could mean full system compromise, lateral movement within a network, and unauthorised access to sensitive data.
Exploitation in the Wild
CISA has confirmed that these vulnerabilities are being actively weaponised. Threat actors are rapidly incorporating them into their attack chains, highlighting the urgency for defenders to detect and mitigate affected instances.
My Nuclei Detection Script
To support the security community, I created a Nuclei detection template that helps identify vulnerable N-central installations. The script checks for the exposed login endpoint, validates the presence of N-central, extracts the version number, and compares it against the patched version (2025.3.1.9).
Here’s what the script does step by step:
Sends a GET request to the N-central login page.
Matches page indicators confirming the application is N-central.
Extracts the software version via regex from the HTML response.
Compares the version number with the safe baseline (2025.3.1.9).
Flags the host if it’s vulnerable.
id: CVE-2025-8875/6
info:
name: CVE-2025-8875/6
author: rxerium
severity: critical
description: |
Deserialization of Untrusted Data vulnerability in N-able N-central allows Local Execution of Code. This issue affects N-central: before 2025.3.1.
metadata:
verified: true
max-request: 1
shodan-query:
- http.title:"N-central Login"
tags: n-able,ncentral,kev
http:
- method: GET
path:
- "{{BaseURL}}/login"
extractors:
- type: regex
name: version
regex:
- '202\d+\.\d+\.\d+\.\d+\b'
part: body
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- 'class="ncentral"'
- type: dsl
dsl:
- compare_versions(version, '< 2025.3.1.9')
A link to my detection script can be found on GitHub here.
Community Recognition
The script was well received and shared within the community. After posting it on Twitter (X), it reached over 20,000 impressions — a sign of how important and urgent actionable detection methods for these vulnerabilities are, my original post on this can be found here.
Following this, I sent another post on the 21st of August 2025 stating how many IP addresses were still vulnerable to these CVEs, reminding IT and security admins to patch their systems:
Closing Thoughts
With CVE-2025-8875 and CVE-2025-8876 actively exploited in the wild, defenders must move fast. Whether you’re a security researcher, a SOC analyst, or a sysadmin, deploying detection mechanisms like this can buy valuable time until patches are fully rolled out.
I’ll continue to publish more Nuclei templates and detection scripts to help the community stay ahead of threats.
Subscribe to my newsletter
Read articles from Rishi directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
