{"vulnerability": "cve-2025-2263", "sightings": [{"uuid": "73b2fc91-eb14-4ee4-8c63-9cece7860a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2263", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkdhfokytv2q", "content": "", "creation_timestamp": "2025-03-14T11:00:06.155945Z"}, {"uuid": "9870820c-5a49-4b95-a64c-d801423a6d2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22630", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li4nthmhm22a", "content": "", "creation_timestamp": "2025-02-14T07:16:10.241608Z"}, {"uuid": "ac7aea51-d93f-4e66-a29e-f33cd5c8dea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22630", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114001373160413583", "content": "", "creation_timestamp": "2025-02-14T08:48:26.540382Z"}, {"uuid": "843659fe-fcd4-4513-aa7b-54564cddc3d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22630", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li4vbyyck72z", "content": "", "creation_timestamp": "2025-02-14T09:29:34.112037Z"}, {"uuid": "d3a29c7f-ec75-417e-a9ef-3eb8f6d33229", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22631", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3livd6rvmrh2k", "content": "", "creation_timestamp": "2025-02-24T02:42:14.696712Z"}, {"uuid": "dde69158-451d-4e3a-8b68-eda98aa1b7ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2263", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkc76aoy3j2j", "content": "", "creation_timestamp": "2025-03-13T23:00:07.804863Z"}, {"uuid": "2217fb52-208b-415f-8e7b-bec4ea50784c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22630", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li6fwvhjcg2e", "content": "", "creation_timestamp": "2025-02-15T00:00:17.184047Z"}, {"uuid": "30706a26-bcdc-4991-9dbe-70e32d6837ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22630", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3li7o64pbzw2p", "content": "", "creation_timestamp": "2025-02-15T12:00:06.607647Z"}, {"uuid": "3ec0b26d-dca1-499f-ac56-bfd8928db844", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22635", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3livd6qrfsg2l", "content": "", "creation_timestamp": "2025-02-24T02:42:10.632929Z"}, {"uuid": "72bc6687-69e7-4bed-a66e-ab0c21b6d6ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2263", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lkq2wlkm5k2a", "content": "", "creation_timestamp": "2025-03-19T11:21:33.240207Z"}, {"uuid": "f8d8ba99-1559-4f3e-a191-ef5297de8964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22632", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3livd6rfa632t", "content": "", "creation_timestamp": "2025-02-24T02:42:12.357615Z"}, {"uuid": "230ffde8-e4f9-4fc5-b2c6-4c650c86f5de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22633", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3livd6roh4223", "content": "", "creation_timestamp": "2025-02-24T02:42:13.495563Z"}, {"uuid": "1d97110a-bfe4-4d34-9128-843ee4d999ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2263", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "11bd656f-e560-430e-bc25-ab12ca73e74b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22639", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lii3c4rd6w2y", "content": "", "creation_timestamp": "2025-02-18T20:16:17.413668Z"}, {"uuid": "fcfbef96-d5b1-4778-a34a-6e6b537ecffc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22639", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114027325626941190", "content": "", "creation_timestamp": "2025-02-18T22:48:30.133814Z"}, {"uuid": "8b3d9e61-c89f-42a0-a449-3adc372d65f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2263", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114156378580302593", "content": "", "creation_timestamp": "2025-03-13T17:48:22.187657Z"}, {"uuid": "ca341269-ef1c-4aad-8007-21f0a82171ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2263", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114156468726860927", "content": "", "creation_timestamp": "2025-03-13T18:11:16.920548Z"}, {"uuid": "ee83c9dc-1ae9-4a5d-bea2-97b443940dbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22630", "type": "seen", "source": "Telegram/jXYV4US2cJq1VQkWtlm3W5ntVw0cXRlfqKflAjgmGPNfDhXO", "content": "", "creation_timestamp": "2025-02-14T21:08:29.000000Z"}, {"uuid": "ccf501bd-87ef-407b-a91a-80fb78109e87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2263", "type": "seen", "source": "https://t.me/cvedetector/20235", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2263 - Sante PACS Server.exe OpenSSL Stack-Based Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2025-2263 \nPublished : March 13, 2025, 5:15 p.m. | 43\u00a0minutes ago \nDescription : During login to the web server in \"Sante PACS Server.exe\", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T19:48:12.000000Z"}, {"uuid": "df14af48-cb90-4636-b800-ec6d9ce69e25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22635", "type": "seen", "source": "https://t.me/cvedetector/18765", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22635 - Jyothis Joy Eventer Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-22635 \nPublished : Feb. 23, 2025, 11:15 p.m. | 1\u00a0hour, 22\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jyothis Joy Eventer allows Reflected XSS. This issue affects Eventer: from n/a through n/a. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-24T02:04:26.000000Z"}, {"uuid": "b1c47ec6-e39d-453f-b22c-2e23a7aabddc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22633", "type": "seen", "source": "https://t.me/cvedetector/18764", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22633 - Divi Donation Modules Sensitive Data Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-22633 \nPublished : Feb. 23, 2025, 11:15 p.m. | 1\u00a0hour, 22\u00a0minutes ago \nDescription : Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Matt Cromwell Give \u2013 Divi Donation Modules allows Retrieve Embedded Sensitive Data. This issue affects Give \u2013 Divi Donation Modules: from n/a through 2.0.0. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-24T02:04:26.000000Z"}, {"uuid": "6ca67468-2e8e-453f-95a0-11d3b5c797b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22632", "type": "seen", "source": "https://t.me/cvedetector/18763", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22632 - Totalsoft WooCommerce Pricing Stored Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22632 \nPublished : Feb. 23, 2025, 11:15 p.m. | 1\u00a0hour, 22\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in totalsoft WooCommerce Pricing \u2013 Product Pricing allows Stored XSS. This issue affects WooCommerce Pricing \u2013 Product Pricing: from n/a through 1.0.9. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-24T02:04:25.000000Z"}, {"uuid": "b76c389c-992b-4c54-a7ce-ad366d8c991c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22631", "type": "seen", "source": "https://t.me/cvedetector/18762", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22631 - Vbout Marketing Automation Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-22631 \nPublished : Feb. 23, 2025, 11:15 p.m. | 1\u00a0hour, 22\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in vbout Marketing Automation allows Reflected XSS. This issue affects Marketing Automation: from n/a through 1.2.6.8. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-24T02:04:21.000000Z"}, {"uuid": "4bef7d02-00b3-4523-b08e-c8c846ddc6e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2263", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:28.000000Z"}, {"uuid": "66be2f5f-9731-430f-a75f-2a9411812188", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22631", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5110", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22631\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in vbout Marketing Automation allows Reflected XSS. This issue affects Marketing Automation: from n/a through 1.2.6.8.\n\ud83d\udccf Published: 2025-02-23T22:55:06.174Z\n\ud83d\udccf Modified: 2025-02-23T22:55:06.174Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/marketing-automation/vulnerability/wordpress-marketing-automation-plugin-1-2-6-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-23T23:22:42.000000Z"}, {"uuid": "a9ee9336-baf3-4a32-977e-a8477704e9cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22632", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5109", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22632\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in totalsoft WooCommerce Pricing \u2013 Product Pricing allows Stored XSS. This issue affects WooCommerce Pricing \u2013 Product Pricing: from n/a through 1.0.9.\n\ud83d\udccf Published: 2025-02-23T22:55:06.392Z\n\ud83d\udccf Modified: 2025-02-23T22:55:06.392Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/woo-pricing-table/vulnerability/wordpress-woocommerce-pricing-product-pricing-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-23T23:22:38.000000Z"}, {"uuid": "7ae77a9f-f64d-495c-a668-289d28499a4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22633", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5108", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22633\n\ud83d\udd25 CVSS Score: 5.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)\n\ud83d\udd39 Description: Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Matt Cromwell Give \u2013 Divi Donation Modules allows Retrieve Embedded Sensitive Data. This issue affects Give \u2013 Divi Donation Modules: from n/a through 2.0.0.\n\ud83d\udccf Published: 2025-02-23T22:55:06.569Z\n\ud83d\udccf Modified: 2025-02-23T22:55:06.569Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/give-donation-modules-for-divi/vulnerability/wordpress-give-divi-donation-modules-plugin-2-0-0-sensitive-data-exposure-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-23T23:22:37.000000Z"}, {"uuid": "780c39ff-138a-4630-b0e2-4eac65023a99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22630", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4437", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22630\n\ud83d\udd25 CVSS Score: 10 (CVSS_V3)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in MarketingFire Widget Options allows OS Command Injection.This issue affects Widget Options: from n/a through 4.1.0.\n\ud83d\udccf Published: 2025-02-14T09:31:22Z\n\ud83d\udccf Modified: 2025-02-14T09:31:22Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-22630\n2. https://patchstack.com/database/wordpress/plugin/widget-options/vulnerability/wordpress-widget-options-plugin-4-1-0-arbitrary-code-execution-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-14T10:10:48.000000Z"}, {"uuid": "40c6930d-735a-4721-a4c2-8f2237266bda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22635", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5107", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22635\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jyothis Joy Eventer allows Reflected XSS. This issue affects Eventer: from n/a through n/a.\n\ud83d\udccf Published: 2025-02-23T22:55:06.748Z\n\ud83d\udccf Modified: 2025-02-23T22:55:06.748Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/eventer/vulnerability/wordpress-eventer-wordpress-event-booking-manager-plugin-plugin-3-9-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-02-23T23:22:36.000000Z"}, {"uuid": "ce2fb9c0-6c77-465b-b791-f114043e855c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2263", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7425", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2263\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: During login to the web server in \"Sante PACS Server.exe\", OpenSSL function EVP_DecryptUpdate is called to decrypt the username and password. A fixed 0x80-byte stack-based buffer is passed to the function as the output buffer. A stack-based buffer overflow exists if a long encrypted username or password is supplied by an unauthenticated remote attacker.\n\ud83d\udccf Published: 2025-03-13T16:25:59.356Z\n\ud83d\udccf Modified: 2025-03-13T16:29:58.290Z\n\ud83d\udd17 References:\n1. https://www.tenable.com/security/research/tra-2025-08", "creation_timestamp": "2025-03-13T16:45:18.000000Z"}, {"uuid": "2e5ea7c3-96ce-4a0a-af9d-818f69e993c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22630", "type": "seen", "source": "Telegram/yBgEEiIcpa9dykpA9AMr_EQutf-wpD7fh0jBNmHLGrbjsj1x", "content": "", "creation_timestamp": "2025-02-14T10:09:25.000000Z"}, {"uuid": "f33d3a6f-41a7-4ff8-b1ee-fca9d59b24a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22635", "type": "seen", "source": "Telegram/E_P3PXjqE-E_aZW_-g7UQoytdZKlItiPWKnl6W-_xrHVCxE2", "content": "", "creation_timestamp": "2025-02-24T14:08:41.000000Z"}, {"uuid": "7571c0b9-3e0a-41ee-ab05-0b7fc21d7613", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22633", "type": "seen", "source": "Telegram/4PGu7V2rjlmMk7VBgM783dB5MNCiNml98JlEw_ayngaQ6ELp", "content": "", "creation_timestamp": "2025-02-24T14:08:41.000000Z"}, {"uuid": "506fb237-20ed-4e00-aaee-32e4610052cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22632", "type": "seen", "source": "Telegram/XzRCo9mX32rMUUQTsQ-qvejQLKy1ycWl4fRz0UX2PPZnhdgm", "content": "", "creation_timestamp": "2025-02-24T14:08:41.000000Z"}, {"uuid": "cdf3d4bc-b415-42d7-abc2-1525a2d459dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22631", "type": "seen", "source": "Telegram/nOPeCzd6DWNwBbYpoSwOlSkK4bTCQx8Y6WCcgcBVd14W3njQ", "content": "", "creation_timestamp": "2025-02-24T14:08:41.000000Z"}, {"uuid": "2b7b3002-0751-411a-a288-e7d3bd339259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22637", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9127", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22637\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in verkkovaraani Print PDF Generator and Publisher allows Cross Site Request Forgery.This issue affects Print PDF Generator and Publisher: from n/a through 1.2.0.\n\ud83d\udccf Published: 2025-03-27T15:26:52.811Z\n\ud83d\udccf Modified: 2025-03-27T16:15:25.553Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/nopeamedia/vulnerability/wordpress-print-pdf-generator-and-publisher-plugin-1-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-27T16:26:49.000000Z"}, {"uuid": "8fd78d4d-3adf-4af3-a9ab-b14f4527fadb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22634", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9128", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22634\n\ud83d\udd25 CVSS Score: 5.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in MD Abu Jubayer Hossain Easy Booked \u2013 Appointment Booking and Scheduling Management System for WordPress allows Cross Site Request Forgery.This issue affects Easy Booked \u2013 Appointment Booking and Scheduling Management System for WordPress: from n/a through 2.4.5.\n\ud83d\udccf Published: 2025-03-27T15:27:43.481Z\n\ud83d\udccf Modified: 2025-03-27T16:15:09.542Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/easy-booked/vulnerability/wordpress-easy-booked-plugin-2-4-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-27T16:26:50.000000Z"}, {"uuid": "4133d060-8f01-47fa-b98b-1a6b58432bce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22630", "type": "seen", "source": "https://t.me/cvedetector/18073", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22630 - MarketingFire Widget Options Command Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22630 \nPublished : Feb. 14, 2025, 7:15 a.m. | 39\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in MarketingFire Widget Options allows OS Command Injection.This issue affects Widget Options: from n/a through 4.1.0. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T09:04:01.000000Z"}, {"uuid": "7d286ec6-05f6-47f5-8616-da08a57a67ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22630", "type": "seen", "source": "Telegram/d0losjBE12dX4X3gzreoa3bTr2vTzEuGciKMB7PhVWSh97g", "content": "", "creation_timestamp": "2025-02-14T08:30:33.000000Z"}]}