{"vulnerability": "CVE-2025-22621", "sightings": [{"uuid": "482765fc-0ee4-4b04-8e2a-824b84149451", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22621", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf65ogaip72f", "content": "", "creation_timestamp": "2025-01-07T17:16:45.075728Z"}, {"uuid": "19ca5c4b-ba57-4320-883e-3e91cd20dd8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22621", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113788238955581046", "content": "", "creation_timestamp": "2025-01-07T17:25:37.025413Z"}, {"uuid": "6c4d9550-5567-4a3a-b4bf-cf2feb4ac0bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22621", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113788247636966235", "content": "", "creation_timestamp": "2025-01-07T17:27:49.158689Z"}, {"uuid": "416f5569-3aff-4804-98c8-259542947c8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22621", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113788280902206171", "content": "", "creation_timestamp": "2025-01-07T17:36:18.207028Z"}, {"uuid": "4a81dba8-3e2f-4222-ac72-39bdd88d4ea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22621", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/511", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22621\n\ud83d\udd39 Description: In versions 1.0.67 and lower of the Splunk App for SOAR, the Splunk documentation for that app recommended adding the `admin_all_objects` capability to the `splunk_app_soar` role. This addition could lead to improper access control for a low-privileged user that does not hold the \u201cadmin\u201c  Splunk roles.\n\ud83d\udccf Published: 2025-01-07T16:48:32.866Z\n\ud83d\udccf Modified: 2025-01-07T18:20:09.220Z\n\ud83d\udd17 References:\n1. https://advisory.splunk.com/advisories/SVD-2025-0101", "creation_timestamp": "2025-01-07T18:38:48.000000Z"}, {"uuid": "ecbc782c-cc0d-4f9e-aeff-dfcaf11664f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22621", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5876", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22621\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N)\n\ud83d\udd39 Description: In versions 1.0.67 and lower of the Splunk App for SOAR, the Splunk documentation for that app recommended adding the `admin_all_objects` capability to the `splunk_app_soar` role. This addition could lead to improper access control for a low-privileged user that does not hold the \"admin\"  Splunk roles.\n\ud83d\udccf Published: 2025-01-07T16:48:32.866Z\n\ud83d\udccf Modified: 2025-02-28T11:03:57.914Z\n\ud83d\udd17 References:\n1. https://advisory.splunk.com/advisories/SVD-2025-0101", "creation_timestamp": "2025-02-28T11:26:11.000000Z"}, {"uuid": "a9490ff7-54ee-4195-ad7f-a0d2bc716a41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22621", "type": "seen", "source": "https://t.me/cvedetector/14567", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22621 - Splunk App for SOAR Unauthorized Access Control\", \n  \"Content\": \"CVE ID : CVE-2025-22621 \nPublished : Jan. 7, 2025, 5:15 p.m. | 31\u00a0minutes ago \nDescription : In versions 1.0.67 and lower of the Splunk App for SOAR, the Splunk documentation for that app recommended adding the `admin_all_objects` capability to the `splunk_app_soar` role. This addition could lead to improper access control for a low-privileged user that does not hold the \u201cadmin\u201c  Splunk roles. \nSeverity: 6.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-07T18:53:50.000000Z"}]}