<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 May 2026 03:54:26 +0000</lastBuildDate>
    <item>
      <title>e0f04dd0-6cde-4806-9f18-f064d0dd378c</title>
      <link>https://vulnerability.circl.lu/sighting/e0f04dd0-6cde-4806-9f18-f064d0dd378c/export</link>
      <description>{"uuid": "e0f04dd0-6cde-4806-9f18-f064d0dd378c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26158", "type": "seen", "source": "https://t.me/cvedetector/18117", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26158 - Kashipara Online Attendance Management System Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-26158 \nPublished : Feb. 14, 2025, 5:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the manage-employee.php page of Kashipara Online Attendance Management System V1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the department parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T19:56:47.000000Z"}</description>
      <content:encoded>{"uuid": "e0f04dd0-6cde-4806-9f18-f064d0dd378c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26158", "type": "seen", "source": "https://t.me/cvedetector/18117", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26158 - Kashipara Online Attendance Management System Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-26158 \nPublished : Feb. 14, 2025, 5:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the manage-employee.php page of Kashipara Online Attendance Management System V1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the department parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T19:56:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/e0f04dd0-6cde-4806-9f18-f064d0dd378c/export</guid>
      <pubDate>Fri, 14 Feb 2025 19:56:47 +0000</pubDate>
    </item>
    <item>
      <title>83aaafd7-6d01-466d-95d9-5db180b71fd1</title>
      <link>https://vulnerability.circl.lu/sighting/83aaafd7-6d01-466d-95d9-5db180b71fd1/export</link>
      <description>{"uuid": "83aaafd7-6d01-466d-95d9-5db180b71fd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26156", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114004204832093791", "content": "", "creation_timestamp": "2025-02-14T20:49:07.731961Z"}</description>
      <content:encoded>{"uuid": "83aaafd7-6d01-466d-95d9-5db180b71fd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26156", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114004204832093791", "content": "", "creation_timestamp": "2025-02-14T20:49:07.731961Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/83aaafd7-6d01-466d-95d9-5db180b71fd1/export</guid>
      <pubDate>Fri, 14 Feb 2025 20:49:07 +0000</pubDate>
    </item>
    <item>
      <title>d4a0feb7-1136-46c8-b9a5-6da975f894c8</title>
      <link>https://vulnerability.circl.lu/sighting/d4a0feb7-1136-46c8-b9a5-6da975f894c8/export</link>
      <description>{"uuid": "d4a0feb7-1136-46c8-b9a5-6da975f894c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26153", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmxo3ko6t52q", "content": "", "creation_timestamp": "2025-04-16T22:43:21.856511Z"}</description>
      <content:encoded>{"uuid": "d4a0feb7-1136-46c8-b9a5-6da975f894c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26153", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmxo3ko6t52q", "content": "", "creation_timestamp": "2025-04-16T22:43:21.856511Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/d4a0feb7-1136-46c8-b9a5-6da975f894c8/export</guid>
      <pubDate>Wed, 16 Apr 2025 22:43:21 +0000</pubDate>
    </item>
    <item>
      <title>a8d17577-ae0c-4936-af1e-952233d7fc19</title>
      <link>https://vulnerability.circl.lu/sighting/a8d17577-ae0c-4936-af1e-952233d7fc19/export</link>
      <description>{"uuid": "a8d17577-ae0c-4936-af1e-952233d7fc19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26153", "type": "seen", "source": "https://t.me/cvedetector/23176", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26153 - Chamilo LMS Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-26153 \nPublished : April 16, 2025, 9:15 p.m. | 30\u00a0minutes ago \nDescription : A Stored XSS vulnerability exists in the message compose feature of Chamilo LMS 1.11.28. Attackers can inject malicious scripts into messages, which execute when victims, such as administrators, reply to the message. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T00:25:50.000000Z"}</description>
      <content:encoded>{"uuid": "a8d17577-ae0c-4936-af1e-952233d7fc19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26153", "type": "seen", "source": "https://t.me/cvedetector/23176", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26153 - Chamilo LMS Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-26153 \nPublished : April 16, 2025, 9:15 p.m. | 30\u00a0minutes ago \nDescription : A Stored XSS vulnerability exists in the message compose feature of Chamilo LMS 1.11.28. Attackers can inject malicious scripts into messages, which execute when victims, such as administrators, reply to the message. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T00:25:50.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a8d17577-ae0c-4936-af1e-952233d7fc19/export</guid>
      <pubDate>Thu, 17 Apr 2025 00:25:50 +0000</pubDate>
    </item>
    <item>
      <title>0a5bcf5c-42d6-4ea4-b698-a75f0092ed5f</title>
      <link>https://vulnerability.circl.lu/sighting/0a5bcf5c-42d6-4ea4-b698-a75f0092ed5f/export</link>
      <description>{"uuid": "0a5bcf5c-42d6-4ea4-b698-a75f0092ed5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26153", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12423", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26153\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Stored XSS vulnerability exists in the message compose feature of Chamilo LMS 1.11.28. Attackers can inject malicious scripts into messages, which execute when victims, such as administrators, reply to the message.\n\ud83d\udccf Published: 2025-04-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-18T12:02:40.609Z\n\ud83d\udd17 References:\n1. https://github.com/chamilo/chamilo-lms/commit/beb07770d674fcc9db6df0e59aab107678c28682\n2. https://github.com/chamilo/chamilo-lms/commit/d5c29cf39ac30d7364a52bba4036c3e870412066\n3. https://gist.github.com/NoSpaceAvailable/234acdf57b5d7b29b2f39090c1686bc8", "creation_timestamp": "2025-04-18T12:58:29.000000Z"}</description>
      <content:encoded>{"uuid": "0a5bcf5c-42d6-4ea4-b698-a75f0092ed5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26153", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12423", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26153\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Stored XSS vulnerability exists in the message compose feature of Chamilo LMS 1.11.28. Attackers can inject malicious scripts into messages, which execute when victims, such as administrators, reply to the message.\n\ud83d\udccf Published: 2025-04-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-18T12:02:40.609Z\n\ud83d\udd17 References:\n1. https://github.com/chamilo/chamilo-lms/commit/beb07770d674fcc9db6df0e59aab107678c28682\n2. https://github.com/chamilo/chamilo-lms/commit/d5c29cf39ac30d7364a52bba4036c3e870412066\n3. https://gist.github.com/NoSpaceAvailable/234acdf57b5d7b29b2f39090c1686bc8", "creation_timestamp": "2025-04-18T12:58:29.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/0a5bcf5c-42d6-4ea4-b698-a75f0092ed5f/export</guid>
      <pubDate>Fri, 18 Apr 2025 12:58:29 +0000</pubDate>
    </item>
    <item>
      <title>3a07f3fc-cc15-4808-83bf-b98d30174cb1</title>
      <link>https://vulnerability.circl.lu/sighting/3a07f3fc-cc15-4808-83bf-b98d30174cb1/export</link>
      <description>{"uuid": "3a07f3fc-cc15-4808-83bf-b98d30174cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/33600", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis script decodes, filters, and extracts cookies as part of the exploitation of CVE-2025-26159.\nURL\uff1ahttps://github.com/godBADTRY/CVE-2025-26159\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-22T11:31:58.000000Z"}</description>
      <content:encoded>{"uuid": "3a07f3fc-cc15-4808-83bf-b98d30174cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/33600", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis script decodes, filters, and extracts cookies as part of the exploitation of CVE-2025-26159.\nURL\uff1ahttps://github.com/godBADTRY/CVE-2025-26159\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-22T11:31:58.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3a07f3fc-cc15-4808-83bf-b98d30174cb1/export</guid>
      <pubDate>Tue, 22 Apr 2025 11:31:58 +0000</pubDate>
    </item>
    <item>
      <title>509c423a-668b-409c-8eef-6409d2d24074</title>
      <link>https://vulnerability.circl.lu/sighting/509c423a-668b-409c-8eef-6409d2d24074/export</link>
      <description>{"uuid": "509c423a-668b-409c-8eef-6409d2d24074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12978", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26159\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Laravel Starter 11.11.0 is vulnerable to Cross Site Scripting (XSS) in the tags feature. Any user with the ability of create or modify tags can inject malicious JavaScript code in the name field.\n\ud83d\udccf Published: 2025-04-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-22T20:43:07.620Z\n\ud83d\udd17 References:\n1. https://github.com/nasirkhan/laravel-starter\n2. https://godbadtry.github.io/posts/CVE-2025-26159/", "creation_timestamp": "2025-04-22T21:04:18.000000Z"}</description>
      <content:encoded>{"uuid": "509c423a-668b-409c-8eef-6409d2d24074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12978", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26159\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Laravel Starter 11.11.0 is vulnerable to Cross Site Scripting (XSS) in the tags feature. Any user with the ability of create or modify tags can inject malicious JavaScript code in the name field.\n\ud83d\udccf Published: 2025-04-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-22T20:43:07.620Z\n\ud83d\udd17 References:\n1. https://github.com/nasirkhan/laravel-starter\n2. https://godbadtry.github.io/posts/CVE-2025-26159/", "creation_timestamp": "2025-04-22T21:04:18.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/509c423a-668b-409c-8eef-6409d2d24074/export</guid>
      <pubDate>Tue, 22 Apr 2025 21:04:18 +0000</pubDate>
    </item>
    <item>
      <title>bc7ff992-b144-46e1-8bb2-2cf3ab00e8f2</title>
      <link>https://vulnerability.circl.lu/sighting/bc7ff992-b144-46e1-8bb2-2cf3ab00e8f2/export</link>
      <description>{"uuid": "bc7ff992-b144-46e1-8bb2-2cf3ab00e8f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lngln46wj424", "content": "", "creation_timestamp": "2025-04-22T21:09:32.965522Z"}</description>
      <content:encoded>{"uuid": "bc7ff992-b144-46e1-8bb2-2cf3ab00e8f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lngln46wj424", "content": "", "creation_timestamp": "2025-04-22T21:09:32.965522Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/bc7ff992-b144-46e1-8bb2-2cf3ab00e8f2/export</guid>
      <pubDate>Tue, 22 Apr 2025 21:09:32 +0000</pubDate>
    </item>
    <item>
      <title>aed6fadc-b11a-458c-b31f-c94be5eb3e0d</title>
      <link>https://vulnerability.circl.lu/sighting/aed6fadc-b11a-458c-b31f-c94be5eb3e0d/export</link>
      <description>{"uuid": "aed6fadc-b11a-458c-b31f-c94be5eb3e0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "seen", "source": "https://t.me/cvedetector/23561", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26159 - Laravel Starter XSS in Tag Name Field\", \n  \"Content\": \"CVE ID : CVE-2025-26159 \nPublished : April 22, 2025, 8:15 p.m. | 1\u00a0hour, 48\u00a0minutes ago \nDescription : Laravel Starter 11.11.0 is vulnerable to Cross Site Scripting (XSS) in the tags feature. Any user with the ability of create or modify tags can inject malicious JavaScript code in the name field. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T00:15:53.000000Z"}</description>
      <content:encoded>{"uuid": "aed6fadc-b11a-458c-b31f-c94be5eb3e0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "seen", "source": "https://t.me/cvedetector/23561", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26159 - Laravel Starter XSS in Tag Name Field\", \n  \"Content\": \"CVE ID : CVE-2025-26159 \nPublished : April 22, 2025, 8:15 p.m. | 1\u00a0hour, 48\u00a0minutes ago \nDescription : Laravel Starter 11.11.0 is vulnerable to Cross Site Scripting (XSS) in the tags feature. Any user with the ability of create or modify tags can inject malicious JavaScript code in the name field. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T00:15:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/aed6fadc-b11a-458c-b31f-c94be5eb3e0d/export</guid>
      <pubDate>Wed, 23 Apr 2025 00:15:53 +0000</pubDate>
    </item>
    <item>
      <title>37d88554-5461-4c00-b6e5-63720ea8996f</title>
      <link>https://vulnerability.circl.lu/sighting/37d88554-5461-4c00-b6e5-63720ea8996f/export</link>
      <description>{"uuid": "37d88554-5461-4c00-b6e5-63720ea8996f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26157", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}</description>
      <content:encoded>{"uuid": "37d88554-5461-4c00-b6e5-63720ea8996f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26157", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/37d88554-5461-4c00-b6e5-63720ea8996f/export</guid>
      <pubDate>Mon, 25 Aug 2025 18:31:44 +0000</pubDate>
    </item>
  </channel>
</rss>
