<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 11:40:16 +0000</lastBuildDate>
    <item>
      <title>1cb5c33d-2a56-46b0-aaac-904e6c4a5dbe</title>
      <link>https://vulnerability.circl.lu/sighting/1cb5c33d-2a56-46b0-aaac-904e6c4a5dbe/export</link>
      <description>{"uuid": "1cb5c33d-2a56-46b0-aaac-904e6c4a5dbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32971", "type": "seen", "source": "https://t.me/cvedetector/24113", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32971 - XWiki Solr Script Service Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-32971 \nPublished : April 30, 2025, 3:16 p.m. | 28\u00a0minutes ago \nDescription : XWiki is a generic wiki platform. In versions starting from 4.5.1 to before 15.10.13, from 16.0.0-rc-1 to before 16.4.4, and from 16.5.0-rc-1 to before 16.8.0-rc-1, the Solr script service doesn't take dropped programming rights into account. The Solr script service that is accessible in XWiki's scripting API normally requires programming rights to be called. Due to using the wrong API for checking rights, it doesn't take the fact into account that programming rights might have been dropped by calling `$xcontext.dropPermissions()`. If some code relies on this for the safety of executing Velocity code with the wrong author context, this could allow a user with script rights to either cause a high load by indexing documents or to temporarily remove documents from the search index. This issue has been patched in versions 15.10.13, 16.4.4, and 16.8.0-rc-1. \nSeverity: 3.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T17:55:14.000000Z"}</description>
      <content:encoded>{"uuid": "1cb5c33d-2a56-46b0-aaac-904e6c4a5dbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32971", "type": "seen", "source": "https://t.me/cvedetector/24113", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32971 - XWiki Solr Script Service Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2025-32971 \nPublished : April 30, 2025, 3:16 p.m. | 28\u00a0minutes ago \nDescription : XWiki is a generic wiki platform. In versions starting from 4.5.1 to before 15.10.13, from 16.0.0-rc-1 to before 16.4.4, and from 16.5.0-rc-1 to before 16.8.0-rc-1, the Solr script service doesn't take dropped programming rights into account. The Solr script service that is accessible in XWiki's scripting API normally requires programming rights to be called. Due to using the wrong API for checking rights, it doesn't take the fact into account that programming rights might have been dropped by calling `$xcontext.dropPermissions()`. If some code relies on this for the safety of executing Velocity code with the wrong author context, this could allow a user with script rights to either cause a high load by indexing documents or to temporarily remove documents from the search index. This issue has been patched in versions 15.10.13, 16.4.4, and 16.8.0-rc-1. \nSeverity: 3.8 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T17:55:14.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/1cb5c33d-2a56-46b0-aaac-904e6c4a5dbe/export</guid>
      <pubDate>Wed, 30 Apr 2025 17:55:14 +0000</pubDate>
    </item>
  </channel>
</rss>
