Top 10 DevSecOps Vulnerabilities Found in 2025 So Far
2025 is turning into a hacker’s playground. From CI/CD pipelines leaking secrets to zero-day exploits ripping through cloud and container stacks, attackers aren’t just knocking on the door—they’re already inside. The weakest link in DevSecOps is being hunted, abused, and flipped into full-blown breaches. In this blog, we break down the Top 10 DevSecOps vulnerabilities making headlines in 2025, how they’re being weaponized in the wild, and what it takes to keep your defenses sharp.

2025 is turning into a hacker’s playground. From CI/CD pipelines leaking secrets to zero-day exploits ripping through cloud and container stacks, attackers aren’t just knocking on the door—they’re already inside. The weakest link in DevSecOps is being hunted, abused, and flipped into full-blown breaches. In this blog, we break down the Top 10 DevSecOps vulnerabilities making headlines in 2025, how they’re being weaponized in the wild, and what it takes to keep your defenses sharp.
Top 10 DevSecOps Vulnerabilities Found in 2025 So Far
2025 is not business as usual. It’s a warzone. Attackers aren’t patiently waiting at the gates—they’re crawling through your pipelines, hijacking your containers, and planting backdoors in places you didn’t even know existed. Let’s lift the hood and check out the nastiest cracks being exploited right now.
1. CVE-2025-31324 – SAP NetWeaver Visual Composer Metadata Uploader
- Hack story: Imagine a servlet endpoint that lets you upload “metadata.” SAP forgot to check who’s knocking. Boom — anonymous attacker uploads a JSP shell, calls it from the browser, and suddenly your business-critical SAP system is their playground.
- In the wild: Attackers are dropping shells like helper.jsp and cache.jsp deep inside /irj/servlet_jsp/irj/root/. From there → credential dumping, lateral movement, even log wiping.
- Why deadly: This isn’t a lab bug. It’s being weaponized in real campaigns targeting manufacturing and finance.
2. Secret Sprawl in CI/CD Pipelines
- Hack story: Devs still commit AWS keys, GitHub tokens, Slack webhooks in plain repos. Attackers don’t even need 0days—just GitHub dorks and automated scanners.
- In the wild: Botnets scrape public repos in seconds. The moment creds hit GitHub, they’re being tested on AWS and Azure.
- Impact: Cloud jacking, data exfil, or spinning $50k worth of crypto miners overnight.
3. Supply Chain Poisoning via Malicious Packages
- Hack story: A fake lodash-extras package drops a hidden backdoor. Devs pull it unknowingly. Congratulations—you just shipped the attacker’s malware to prod.
- In the wild: npm and PyPI saw multiple typosquats in early 2025 that harvested environment variables (including secrets).
- Attacker mindset: “Why hack 1 company when I can poison the water supply and own thousands?”
4. Kubernetes Misconfigurations
- Hack story: Open dashboards, no RBAC, pods running as root. Attackers don’t need Metasploit; kubectl exec is enough.
- In the wild: Compromised clusters often end up running cryptominers with persistence pods that restart even after you “clean” them.
- Pro hacker move: Attackers hide in kube-system namespace, blending in with legit workloads.
5. Insecure IaC (Terraform / CloudFormation) Templates
- Hack story: IaC is infra as code—and mistakes are infra as vulnerabilities. Public RDS, open S3, wide IAM roles… attackers love GitHub leaks of .tf files.
- In the wild: Recon bots actively sweep repos for Terraform templates. Once found, infra blueprint = instant attack map.
- Impact: Attackers don’t break in—they just use your own IaC to walk right through the front door.
6. Container Escape Vulnerabilities
- Hack story: Containers are supposed to be walls. But 2025 saw fresh bugs in runc and containerd. Attacker runs crafted payload → leaps from container → owns the host.
- In the wild: Underground forums are already trading POCs for container escapes. Red teams are simulating it, black hats are abusing it.
- Impact: One pod compromise = full cluster takeover.
7. Weak Artifact Signing & Verification
- Hack story: Supply chain trust = broken chain. Teams skip artifact signing or don’t verify. Attacker poisons build → your pipeline happily ships malware.
- In the wild: 2025 already saw trojanized builds pushed to internal registries because no one validated signatures.
- Hacker’s dream: Compromise once → infinite persistence, because the pipeline itself becomes malicious.
8. Misused AI/LLM Integrations
- Hack story: Devs connect LLMs directly into CI/CD for auto code suggestions and infra configs. Attackers poison prompts or seed malicious training data.
- In the wild: Early cases show LLMs generating insecure IaC templates on purpose when poisoned prompts are injected.
- Future threat: Imagine an LLM quietly suggesting “allow all” security groups — and your team blindly ships it.
9. Shadow Admins in Cloud Environments
- Hack story: Forgotten IAM roles with *:* permissions are the skeleton keys of the cloud. Attackers love stale keys found in old repos or logs.
- In the wild: Once attackers escalate into shadow admin, they don’t just steal—they create persistence by spinning hidden users and roles.
- Impact: Even if you rotate your main creds, attackers stay inside, invisible.
10. Insufficient Monitoring & Alert Fatigue
- Hack story: Logs exist but nobody reads them. SIEMs overloaded, alerts ignored. Perfect camouflage for attackers.
- In the wild: Most breaches discovered months later weren’t advanced hacks — they were sitting in logs the whole time.
- Attacker’s edge: Blend in with “normal” traffic, use legit tools, stay under the noise radar.
Final Thoughts
DevSecOps in 2025 is a blood sport. The pipelines we built to ship code faster are now highways for attackers. They slip in through secrets, ride your containers, poison your builds, and camp inside your cloud.
· Think like an attacker.
· Audit like a paranoid.
· Build as if compromise is inevitable.
Because in 2025, the wolves aren’t coming… they’re already in the house.