{"uuid": "fc46caeb-dd94-44d2-b04b-e10e5e9a4862", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32807", "type": "seen", "source": "https://t.me/cvedetector/22690", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32807 - FusionDirectory Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32807 \nPublished : April 11, 2025, 12:15 a.m. | 1\u00a0hour, 12\u00a0minutes ago \nDescription : A path traversal vulnerability in FusionDirectory before 1.5 allows remote attackers to read arbitrary files on the host that end with .png (and .svg or .xpm for some configurations) via the icon parameter of a GET request to geticon.php. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T03:54:09.000000Z"}