{"uuid": "bce2dc70-8944-40ee-a1b8-b48524a54836", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27632", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8646", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27632\n\ud83d\udd25 CVSS Score: 6.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: A Host Header Injection vulnerability in TRMTracker application may allow an attacker by modifying the host header value in an HTTP request to leverage multiple attack vectors, including defacing the site content through web-cache poisoning.\n\ud83d\udccf Published: 2025-03-25T12:37:30.114Z\n\ud83d\udccf Modified: 2025-03-25T13:10:39.102Z\n\ud83d\udd17 References:\n1. https://publisher.hitachienergy.com/preview?DocumentID=8DBD000210&amp;LanguageCode=en&amp;DocumentPartId=&amp;Action=Launch", "creation_timestamp": "2025-03-25T13:23:52.000000Z"}