<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-14T16:37:07.200662+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a0319128-41b8-4f91-9c1f-9f6bca8c2dd5/export</id>
    <title>a0319128-41b8-4f91-9c1f-9f6bca8c2dd5</title>
    <updated>2026-05-14T16:37:07.352047+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a0319128-41b8-4f91-9c1f-9f6bca8c2dd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43848", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14956", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43848\n\ud83d\udd25 CVSS Score: 8.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P)\n\ud83d\udd39 Description: Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The\u00a0ckpt_path0\u00a0variable\u00a0takes user input\u00a0(e.g. a path to a model) and\u00a0passes\u00a0it to the\u00a0change_info\u00a0function in\u00a0process_ckpt.py, which uses it to\u00a0load the model on that path with\u00a0torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist.\n\ud83d\udccf Published: 2025-05-05T17:54:58.884Z\n\ud83d\udccf Modified: 2025-05-05T17:54:58.884Z\n\ud83d\udd17 References:\n1. https://securitylab.github.com/advisories/GHSL-2025-012_GHSL-2025-022_Retrieval-based-Voice-Conversion-WebUI/\n2. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/7ef19867780cf703841ebafb565a4e47d1ea86ff/infer/lib/train/process_ckpt.py#L196\n3. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/9f2f0559e6932c10c48642d404e7d2e771d9db43/infer-web.py#L1415\n4. https://github.com/RVC-Project/Retrieval-based-Voice-Conversion-WebUI/blob/9f2f0559e6932c10c48642d404e7d2e771d9db43/infer-web.py#L1431", "creation_timestamp": "2025-05-05T18:19:41.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a0319128-41b8-4f91-9c1f-9f6bca8c2dd5/export"/>
    <published>2025-05-05T18:19:41+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d5589ca0-cc5d-478f-bd45-b3624fdea7d0/export</id>
    <title>d5589ca0-cc5d-478f-bd45-b3624fdea7d0</title>
    <updated>2026-05-14T16:37:07.351947+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d5589ca0-cc5d-478f-bd45-b3624fdea7d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43843", "type": "seen", "source": "https://t.me/cvedetector/24457", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43843 - Adobe Retrieval-based-Voice-Conversion-WebUI Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43843 \nPublished : May 5, 2025, 5:18 p.m. | 16\u00a0minutes ago \nDescription : Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables\u00a0exp_dir1,\u00a0np7\u00a0and\u00a0f0method8\u00a0take user input and\u00a0pass\u00a0it into the\u00a0extract_f0_feature\u00a0function, which\u00a0concatenates them into a command\u00a0that is run on the server. This can lead to arbitrary command execution. As of time of publication, no known patches exist. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-05T20:03:31.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d5589ca0-cc5d-478f-bd45-b3624fdea7d0/export"/>
    <published>2025-05-05T20:03:31+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2f34a916-a36f-47ea-baf6-88436d36cfa0/export</id>
    <title>2f34a916-a36f-47ea-baf6-88436d36cfa0</title>
    <updated>2026-05-14T16:37:07.351843+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2f34a916-a36f-47ea-baf6-88436d36cfa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43842", "type": "seen", "source": "https://t.me/cvedetector/24460", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43842 - Apache Retrieval-based-Voice-Conversion-WebUI Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43842 \nPublished : May 5, 2025, 5:18 p.m. | 16\u00a0minutes ago \nDescription : Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to command injection. The variables\u00a0exp_dir1,\u00a0np7,\u00a0trainset_dir4\u00a0and\u00a0sr2\u00a0take user input and\u00a0pass\u00a0it to the\u00a0preprocess_dataset\u00a0function, which\u00a0concatenates them into a command\u00a0that is\u00a0run\u00a0on the server. This can lead to arbitrary command execution. As of time of publication, no known patches exist. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-05T20:03:34.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2f34a916-a36f-47ea-baf6-88436d36cfa0/export"/>
    <published>2025-05-05T20:03:34+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/470d8201-088a-452b-9886-6ebd39acbeaa/export</id>
    <title>470d8201-088a-452b-9886-6ebd39acbeaa</title>
    <updated>2026-05-14T16:37:07.351752+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "470d8201-088a-452b-9886-6ebd39acbeaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43849", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3loh6qrf5gq2n", "content": "", "creation_timestamp": "2025-05-05T20:16:44.447938Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/470d8201-088a-452b-9886-6ebd39acbeaa/export"/>
    <published>2025-05-05T20:16:44.447938+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/2c10a55a-6461-4573-8eb5-ef6ed3168bcf/export</id>
    <title>2c10a55a-6461-4573-8eb5-ef6ed3168bcf</title>
    <updated>2026-05-14T16:37:07.351656+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "2c10a55a-6461-4573-8eb5-ef6ed3168bcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43849", "type": "published-proof-of-concept", "source": "Telegram/4ybX3uzHn196N4ZX40WWFSYjrgaegjcyI_GLUDry13ex5SY", "content": "", "creation_timestamp": "2025-05-05T21:33:05.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/2c10a55a-6461-4573-8eb5-ef6ed3168bcf/export"/>
    <published>2025-05-05T21:33:05+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4c36be21-cb84-42ba-b56e-eb1328f19abd/export</id>
    <title>4c36be21-cb84-42ba-b56e-eb1328f19abd</title>
    <updated>2026-05-14T16:37:07.351547+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4c36be21-cb84-42ba-b56e-eb1328f19abd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43849", "type": "seen", "source": "https://t.me/cvedetector/24492", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43849 - Apache TTS Voice Conversion Framework Deserialization RCE\", \n  \"Content\": \"CVE ID : CVE-2025-43849 \nPublished : May 5, 2025, 7:15 p.m. | 20\u00a0minutes ago \nDescription : Retrieval-based-Voice-Conversion-WebUI is a voice changing framework based on VITS. Versions 2.2.231006 and prior are vulnerable to unsafe deserialization. The\u00a0ckpt_a\u00a0and\u00a0cpkt_b\u00a0variables take user input\u00a0(e.g. a path to a model) and\u00a0pass\u00a0it to the\u00a0merge\u00a0function in\u00a0process_ckpt.py, which uses them to\u00a0load the models on those paths with\u00a0torch.load, which can lead to unsafe deserialization and remote code execution. As of time of publication, no known patches exist. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-05T21:44:33.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4c36be21-cb84-42ba-b56e-eb1328f19abd/export"/>
    <published>2025-05-05T21:44:33+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/793152bf-3097-4152-a403-d313de116443/export</id>
    <title>793152bf-3097-4152-a403-d313de116443</title>
    <updated>2026-05-14T16:37:07.351446+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "793152bf-3097-4152-a403-d313de116443", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4384", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15154", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4384\n\ud83d\udd25 CVSS Score: 6 (cvssV4_0, Vector: CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/AU:N/R:U/RE:M/U:Green)\n\ud83d\udd39 Description: The MQTT add-on of PcVue fails to verify that a remote device\u2019s certificate has not already expired or has not yet become valid. This allows malicious devices to present certificates that are not rejected properly.\n\nThe use of a client certificate reduces the risk for random devices to take advantage of this flaw.\n\ud83d\udccf Published: 2025-05-06T15:59:27.839Z\n\ud83d\udccf Modified: 2025-05-06T15:59:27.839Z\n\ud83d\udd17 References:\n1. https://www.pcvue.com/security/#SB2025-3", "creation_timestamp": "2025-05-06T16:21:57.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/793152bf-3097-4152-a403-d313de116443/export"/>
    <published>2025-05-06T16:21:57+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/bbde6198-5a2d-443e-8eee-43a7308f3273/export</id>
    <title>bbde6198-5a2d-443e-8eee-43a7308f3273</title>
    <updated>2026-05-14T16:37:07.351336+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "bbde6198-5a2d-443e-8eee-43a7308f3273", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4384", "type": "seen", "source": "https://t.me/cvedetector/24630", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-4384 - PcVue MQTT Certificate Validation Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-4384 \nPublished : May 6, 2025, 4:15 p.m. | 1\u00a0hour, 50\u00a0minutes ago \nDescription : The MQTT add-on of PcVue fails to verify that a remote device\u2019s certificate has not already expired or has not yet become valid. This allows malicious devices to present certificates that are not rejected properly.  \n  \nThe use of a client certificate reduces the risk for random devices to take advantage of this flaw. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-06T20:20:24.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/bbde6198-5a2d-443e-8eee-43a7308f3273/export"/>
    <published>2025-05-06T20:20:24+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/32eab982-8927-4eb1-b33a-3f2ce372e403/export</id>
    <title>32eab982-8927-4eb1-b33a-3f2ce372e403</title>
    <updated>2026-05-14T16:37:07.351197+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "32eab982-8927-4eb1-b33a-3f2ce372e403", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43841", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16895", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43841\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in jamesdbruner WP Vegas allows Stored XSS.This issue affects WP Vegas: from n/a through 2.2.\n\ud83d\udccf Published: 2025-05-19T17:08:41.224Z\n\ud83d\udccf Modified: 2025-05-19T17:08:41.224Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/vegas-fullscreen-background-slider/vulnerability/wordpress-wp-vegas-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-19T17:39:06.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/32eab982-8927-4eb1-b33a-3f2ce372e403/export"/>
    <published>2025-05-19T17:39:06+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9634a5cf-7d3a-4506-bc8a-8d93b06f1030/export</id>
    <title>9634a5cf-7d3a-4506-bc8a-8d93b06f1030</title>
    <updated>2026-05-14T16:37:07.348510+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>https://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9634a5cf-7d3a-4506-bc8a-8d93b06f1030", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43840", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16896", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43840\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in Ref CheckBot allows Stored XSS.This issue affects CheckBot: from n/a through 1.05.\n\ud83d\udccf Published: 2025-05-19T17:07:20.828Z\n\ud83d\udccf Modified: 2025-05-19T17:07:20.828Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/checkbot/vulnerability/wordpress-checkbot-plugin-1-05-csrf-to-stored-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-19T17:39:07.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9634a5cf-7d3a-4506-bc8a-8d93b06f1030/export"/>
    <published>2025-05-19T17:39:07+00:00</published>
  </entry>
</feed>
