{"vulnerability": "CVE-2025-22137", "sightings": [{"uuid": "cf6fb5c0-d29f-40eb-afba-1de2c74e470f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113793626161781850", "content": "", "creation_timestamp": "2025-01-08T16:15:38.729517Z"}, {"uuid": "6420eaa1-eaa4-4e95-97e8-42b0111056be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfakrgao2a2x", "content": "", "creation_timestamp": "2025-01-08T16:16:23.788005Z"}, {"uuid": "10001f30-5e29-489b-90cc-dd9651d642d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfamb4yjj42e", "content": "", "creation_timestamp": "2025-01-08T16:43:06.676972Z"}, {"uuid": "587f12fa-f9cc-4d63-b172-4d8c4bbf1c80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfamb5r73o2b", "content": "", "creation_timestamp": "2025-01-08T16:43:09.831704Z"}, {"uuid": "0d9a07f1-d2d0-4a7c-a3d8-f2c8daa3e9e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113793757744423238", "content": "", "creation_timestamp": "2025-01-08T16:49:07.291950Z"}, {"uuid": "9f6a3527-1b80-46f1-a0f5-0194604264c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22137", "type": "seen", "source": "https://t.me/cvedetector/14691", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22137 - Pingvin Share File Traversal\", \n  \"Content\": \"CVE ID : CVE-2025-22137 \nPublished : Jan. 8, 2025, 4:15 p.m. | 43\u00a0minutes ago \nDescription : Pingvin Share is a self-hosted file sharing platform and an alternative for WeTransfer. This vulnerability allows an authenticated or unauthenticated (if anonymous shares are allowed) user to overwrite arbitrary files on the server, including sensitive system files, via HTTP POST requests. The issue has been patched in version 1.4.0. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T18:19:09.000000Z"}]}