
The landscape of Common Vulnerabilities and Exposures (CVEs) is evolving in 2025. This shift is driven by the transition of CVE management from MITRE Corporation to the CVE Foundation, and also by increasing recognition of the limits of CVE-centric metrics. By scrutinizing the governance of CVE reporting, one can better understand that more context-aware CVEs are unique identifiers for publicly known information-security vulnerabilities in released software.
For 26 years, MITRE Corporation managed the CVE program, a US government program that identifies and catalogs publicly known vulnerabilities. This centralized effort raised awareness and promoted dialogue on security risks. However, the recent development of the CVE Foundation – spurred by the US government funding uncertainties for MITRE – signals a potential paradigm shift in how CVEs are governed. This transition comes as cybersecurity experts acknowledge, at least privately, that simply counting CVEs often misrepresents their organization’s true security posture. The cybersecurity industry is grappling with the need for more meaningful metrics that genuinely reflect risk reduction, moving beyond performative measures to achieve tangible security improvements.
1: The Transition to the CVE Foundation: Implications for Governance and Transparency Description: The most significant development is the ongoing transition of the CVE Program's management from MITRE to the newly established CVE Foundation. This shift aims to ensure the long-term sustainability and independence of the program through a more diversified funding model. In April 2025, the US government funding for the CVE program was cut with no transition plan. After public outcry, the US government extended funding for 11 months. This opens the potential for a more globally representative and resilient CVE program, less reliant on a single government funding source. The CVE Foundation (https://www.thecvefoundation.org/) was formed on April 16, 2025 and is actively working toward assuming full operational control and responsibility for the CVE program. Concerns regarding the transparency of its formation, and whether it is sufficiently independent from biased corporate self-reporting, have been raised within the cybersecurity community. This may affect the objectivity and reliability of the CVEs in the future.
2: The Declining Relevance of Simple CVE Counts as a Security Metric Description: There's a growing understanding that merely counting the number of CVEs identified or remediated is a flawed and easily gamed metric for assessing an organization's security risk. Although having an industry-wide quantifiable metric for budgeting, staffing, and tracking progress (KPIs), the severity and exploitability of individual CVEs vary – making simple tallies a poor measure of security improvement. This shift supports a move away from misleading metrics toward more context-aware risk assessments. It also encourages organizations to focus on risk rather than CVE counts. Organizations setting goals to "reduce severe CVEs by 5%" might achieve this by addressing less critical issues, while high-impact vulnerabilities remain unpatched, highlighting the inadequacy of this metric in reflecting true security improvement.
3: The Rise of Context-Rich Vulnerability Assessment and Prioritization Description: The future of cybersecurity compliance is trending toward a greater emphasis on vulnerability assessment approaches that incorporate more context beyond the CVE itself. This includes understanding the specific environment, existing security controls, and the potential impact of exploitation. New market segments, such as Adversarial Exposure Validation, are emerging to provide this richer context. Companies to watch include: Horizon3.ai, BreachLock, Picus Security, Cymulate, and others. These solutions enable m ore effective prioritization of remediation efforts based on actual risk and provide a better understanding of which vulnerabilities pose the most significant threat to a specific organization. Cyber threat actors actively exploit known CVEs – often those for which patches exist but have not been applied. This highlights the need to move beyond counting CVEs to actively validating exposure and prioritizing remediation based on exploitability in a specific environment.
Organizations should prepare for these shifts by:
The landscape of CVEs and their role in cybersecurity compliance is changing in 2025. The transition to the CVE Foundation and the growing recognition of the limitations of CVE-centric metrics signal a move toward a more nuanced and risk-aware approach to vulnerability management. Organizations must adopt better assessment methods to manage risks and stay compliant with their governance frameworks.
Global Collaboration and Data Sharing: Highlight the role of increased global collaboration and data sharing among cybersecurity entities, including how crowd-sourced vulnerability information and international partnerships could shape the CVE process and improve overall cybersecurity resilience.