<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-08T21:38:32.654743+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/e0f04dd0-6cde-4806-9f18-f064d0dd378c/export</id>
    <title>e0f04dd0-6cde-4806-9f18-f064d0dd378c</title>
    <updated>2026-05-08T21:38:32.896050+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "e0f04dd0-6cde-4806-9f18-f064d0dd378c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26158", "type": "seen", "source": "https://t.me/cvedetector/18117", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26158 - Kashipara Online Attendance Management System Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-26158 \nPublished : Feb. 14, 2025, 5:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the manage-employee.php page of Kashipara Online Attendance Management System V1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the department parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T19:56:47.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/e0f04dd0-6cde-4806-9f18-f064d0dd378c/export"/>
    <published>2025-02-14T19:56:47+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/83aaafd7-6d01-466d-95d9-5db180b71fd1/export</id>
    <title>83aaafd7-6d01-466d-95d9-5db180b71fd1</title>
    <updated>2026-05-08T21:38:32.895959+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "83aaafd7-6d01-466d-95d9-5db180b71fd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26156", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114004204832093791", "content": "", "creation_timestamp": "2025-02-14T20:49:07.731961Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/83aaafd7-6d01-466d-95d9-5db180b71fd1/export"/>
    <published>2025-02-14T20:49:07.731961+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d4a0feb7-1136-46c8-b9a5-6da975f894c8/export</id>
    <title>d4a0feb7-1136-46c8-b9a5-6da975f894c8</title>
    <updated>2026-05-08T21:38:32.895873+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d4a0feb7-1136-46c8-b9a5-6da975f894c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26153", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmxo3ko6t52q", "content": "", "creation_timestamp": "2025-04-16T22:43:21.856511Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d4a0feb7-1136-46c8-b9a5-6da975f894c8/export"/>
    <published>2025-04-16T22:43:21.856511+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a8d17577-ae0c-4936-af1e-952233d7fc19/export</id>
    <title>a8d17577-ae0c-4936-af1e-952233d7fc19</title>
    <updated>2026-05-08T21:38:32.895773+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a8d17577-ae0c-4936-af1e-952233d7fc19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26153", "type": "seen", "source": "https://t.me/cvedetector/23176", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26153 - Chamilo LMS Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-26153 \nPublished : April 16, 2025, 9:15 p.m. | 30\u00a0minutes ago \nDescription : A Stored XSS vulnerability exists in the message compose feature of Chamilo LMS 1.11.28. Attackers can inject malicious scripts into messages, which execute when victims, such as administrators, reply to the message. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T00:25:50.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a8d17577-ae0c-4936-af1e-952233d7fc19/export"/>
    <published>2025-04-17T00:25:50+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/0a5bcf5c-42d6-4ea4-b698-a75f0092ed5f/export</id>
    <title>0a5bcf5c-42d6-4ea4-b698-a75f0092ed5f</title>
    <updated>2026-05-08T21:38:32.895670+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "0a5bcf5c-42d6-4ea4-b698-a75f0092ed5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26153", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12423", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26153\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Stored XSS vulnerability exists in the message compose feature of Chamilo LMS 1.11.28. Attackers can inject malicious scripts into messages, which execute when victims, such as administrators, reply to the message.\n\ud83d\udccf Published: 2025-04-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-18T12:02:40.609Z\n\ud83d\udd17 References:\n1. https://github.com/chamilo/chamilo-lms/commit/beb07770d674fcc9db6df0e59aab107678c28682\n2. https://github.com/chamilo/chamilo-lms/commit/d5c29cf39ac30d7364a52bba4036c3e870412066\n3. https://gist.github.com/NoSpaceAvailable/234acdf57b5d7b29b2f39090c1686bc8", "creation_timestamp": "2025-04-18T12:58:29.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/0a5bcf5c-42d6-4ea4-b698-a75f0092ed5f/export"/>
    <published>2025-04-18T12:58:29+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/3a07f3fc-cc15-4808-83bf-b98d30174cb1/export</id>
    <title>3a07f3fc-cc15-4808-83bf-b98d30174cb1</title>
    <updated>2026-05-08T21:38:32.895577+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "3a07f3fc-cc15-4808-83bf-b98d30174cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/33600", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis script decodes, filters, and extracts cookies as part of the exploitation of CVE-2025-26159.\nURL\uff1ahttps://github.com/godBADTRY/CVE-2025-26159\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-22T11:31:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/3a07f3fc-cc15-4808-83bf-b98d30174cb1/export"/>
    <published>2025-04-22T11:31:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/509c423a-668b-409c-8eef-6409d2d24074/export</id>
    <title>509c423a-668b-409c-8eef-6409d2d24074</title>
    <updated>2026-05-08T21:38:32.895466+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "509c423a-668b-409c-8eef-6409d2d24074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12978", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26159\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Laravel Starter 11.11.0 is vulnerable to Cross Site Scripting (XSS) in the tags feature. Any user with the ability of create or modify tags can inject malicious JavaScript code in the name field.\n\ud83d\udccf Published: 2025-04-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-22T20:43:07.620Z\n\ud83d\udd17 References:\n1. https://github.com/nasirkhan/laravel-starter\n2. https://godbadtry.github.io/posts/CVE-2025-26159/", "creation_timestamp": "2025-04-22T21:04:18.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/509c423a-668b-409c-8eef-6409d2d24074/export"/>
    <published>2025-04-22T21:04:18+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bc7ff992-b144-46e1-8bb2-2cf3ab00e8f2/export</id>
    <title>bc7ff992-b144-46e1-8bb2-2cf3ab00e8f2</title>
    <updated>2026-05-08T21:38:32.895368+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bc7ff992-b144-46e1-8bb2-2cf3ab00e8f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lngln46wj424", "content": "", "creation_timestamp": "2025-04-22T21:09:32.965522Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bc7ff992-b144-46e1-8bb2-2cf3ab00e8f2/export"/>
    <published>2025-04-22T21:09:32.965522+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/aed6fadc-b11a-458c-b31f-c94be5eb3e0d/export</id>
    <title>aed6fadc-b11a-458c-b31f-c94be5eb3e0d</title>
    <updated>2026-05-08T21:38:32.895230+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "aed6fadc-b11a-458c-b31f-c94be5eb3e0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "seen", "source": "https://t.me/cvedetector/23561", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26159 - Laravel Starter XSS in Tag Name Field\", \n  \"Content\": \"CVE ID : CVE-2025-26159 \nPublished : April 22, 2025, 8:15 p.m. | 1\u00a0hour, 48\u00a0minutes ago \nDescription : Laravel Starter 11.11.0 is vulnerable to Cross Site Scripting (XSS) in the tags feature. Any user with the ability of create or modify tags can inject malicious JavaScript code in the name field. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T00:15:53.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/aed6fadc-b11a-458c-b31f-c94be5eb3e0d/export"/>
    <published>2025-04-23T00:15:53+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/37d88554-5461-4c00-b6e5-63720ea8996f/export</id>
    <title>37d88554-5461-4c00-b6e5-63720ea8996f</title>
    <updated>2026-05-08T21:38:32.892748+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "37d88554-5461-4c00-b6e5-63720ea8996f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26157", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/37d88554-5461-4c00-b6e5-63720ea8996f/export"/>
    <published>2025-08-25T18:31:44+00:00</published>
  </entry>
</feed>
