{"vulnerability": "cve-2025-22142", "sightings": [{"uuid": "76a29cd6-cb90-4ef6-952f-1fa4f8a3de0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22142", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113822816616033754", "content": "", "creation_timestamp": "2025-01-13T19:59:09.837718Z"}, {"uuid": "63d7b887-f657-4c76-bb94-36f7e3e55449", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22142", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfpnsgagbx2z", "content": "", "creation_timestamp": "2025-01-14T16:20:34.750973Z"}, {"uuid": "e6e17f97-f1e3-4994-9ac0-abedd5a20298", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22142", "type": "seen", "source": "https://t.me/cvedetector/15172", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22142 - NamelessMC Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-22142 \nPublished : Jan. 13, 2025, 8:15 p.m. | 43\u00a0minutes ago \nDescription : NamelessMC is a free, easy to use &amp; powerful website software for Minecraft servers. In affected versions an admin can add the ability to have users fill out an additional field and users can inject javascript code into it that would be activated once a staffer visits the user's profile on staff panel. As a result an attacker can execute javascript code on the staffer's computer. This issue has been addressed in version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T22:05:40.000000Z"}, {"uuid": "5f63b943-5792-4715-a492-beb338a02509", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22142", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1369", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22142\n\ud83d\udd39 Description: NamelessMC is a free, easy to use &amp; powerful website software for Minecraft servers. In affected versions an admin can add the ability to have users fill out an additional field and users can inject javascript code into it that would be activated once a staffer visits the user's profile on staff panel. As a result an attacker can execute javascript code on the staffer's computer. This issue has been addressed in version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2025-01-13T19:56:59.869Z\n\ud83d\udccf Modified: 2025-01-13T19:56:59.869Z\n\ud83d\udd17 References:\n1. https://github.com/NamelessMC/Nameless/security/advisories/GHSA-9q22-w64p-g8qm\n2. https://github.com/NamelessMC/Nameless/releases/tag/v2.1.3", "creation_timestamp": "2025-01-13T20:07:11.000000Z"}]}