<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 06 May 2026 07:26:21 +0000</lastBuildDate>
    <item>
      <title>3732f8e9-2743-4f9d-99af-1444356ef628</title>
      <link>https://vulnerability.circl.lu/sighting/3732f8e9-2743-4f9d-99af-1444356ef628/export</link>
      <description>{"uuid": "3732f8e9-2743-4f9d-99af-1444356ef628", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32972", "type": "seen", "source": "https://t.me/cvedetector/24114", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32972 - XWiki LESS Compiler Script Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32972 \nPublished : April 30, 2025, 3:16 p.m. | 28\u00a0minutes ago \nDescription : XWiki is a generic wiki platform. In versions starting from 6.1-milestone-1 to before 15.10.12, from 16.0.0-rc-1 to before 16.4.3, and from 16.5.0-rc-1 to before 16.8.0-rc-1, the script API of the LESS compiler in XWiki is incorrectly checking for rights when calling the cache cleaning API, making it possible to clean the cache without having programming right. The only impact of this is a slowdown in XWiki execution as the caches are re-filled. As this vulnerability requires script right to exploit, and script right already allows unlimited execution of scripts, the additional impact due to this vulnerability is low. This issue has been patched in versions 15.10.12, 16.4.3, and 16.8.0-rc-1. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T17:55:15.000000Z"}</description>
      <content:encoded>{"uuid": "3732f8e9-2743-4f9d-99af-1444356ef628", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32972", "type": "seen", "source": "https://t.me/cvedetector/24114", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32972 - XWiki LESS Compiler Script Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32972 \nPublished : April 30, 2025, 3:16 p.m. | 28\u00a0minutes ago \nDescription : XWiki is a generic wiki platform. In versions starting from 6.1-milestone-1 to before 15.10.12, from 16.0.0-rc-1 to before 16.4.3, and from 16.5.0-rc-1 to before 16.8.0-rc-1, the script API of the LESS compiler in XWiki is incorrectly checking for rights when calling the cache cleaning API, making it possible to clean the cache without having programming right. The only impact of this is a slowdown in XWiki execution as the caches are re-filled. As this vulnerability requires script right to exploit, and script right already allows unlimited execution of scripts, the additional impact due to this vulnerability is low. This issue has been patched in versions 15.10.12, 16.4.3, and 16.8.0-rc-1. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"30 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-30T17:55:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3732f8e9-2743-4f9d-99af-1444356ef628/export</guid>
      <pubDate>Wed, 30 Apr 2025 17:55:15 +0000</pubDate>
    </item>
  </channel>
</rss>
