<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Fri, 08 May 2026 08:11:27 +0000</lastBuildDate>
    <item>
      <title>b20c701d-aee5-4c7d-9af9-82f8d1ea1ee1</title>
      <link>https://vulnerability.circl.lu/sighting/b20c701d-aee5-4c7d-9af9-82f8d1ea1ee1/export</link>
      <description>{"uuid": "b20c701d-aee5-4c7d-9af9-82f8d1ea1ee1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32945", "type": "seen", "source": "https://t.me/cvedetector/22957", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32945 - PeerTube Cross-Site Playlist Manipulation\", \n  \"Content\": \"CVE ID : CVE-2025-32945 \nPublished : April 15, 2025, 1:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : The vulnerability allows an existing user to add playlists to a different user\u2019s channel using the PeerTube REST API. The vulnerable code sets the owner of the new playlist to be the user who performed the request, and then sets the associated channel to the channel ID supplied by the request, without checking if it belongs to the user. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T17:26:34.000000Z"}</description>
      <content:encoded>{"uuid": "b20c701d-aee5-4c7d-9af9-82f8d1ea1ee1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32945", "type": "seen", "source": "https://t.me/cvedetector/22957", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32945 - PeerTube Cross-Site Playlist Manipulation\", \n  \"Content\": \"CVE ID : CVE-2025-32945 \nPublished : April 15, 2025, 1:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : The vulnerability allows an existing user to add playlists to a different user\u2019s channel using the PeerTube REST API. The vulnerable code sets the owner of the new playlist to be the user who performed the request, and then sets the associated channel to the channel ID supplied by the request, without checking if it belongs to the user. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T17:26:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b20c701d-aee5-4c7d-9af9-82f8d1ea1ee1/export</guid>
      <pubDate>Tue, 15 Apr 2025 17:26:34 +0000</pubDate>
    </item>
    <item>
      <title>34d07003-9bd0-4604-adfe-62ba142fd700</title>
      <link>https://vulnerability.circl.lu/sighting/34d07003-9bd0-4604-adfe-62ba142fd700/export</link>
      <description>{"uuid": "34d07003-9bd0-4604-adfe-62ba142fd700", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32946", "type": "seen", "source": "https://t.me/cvedetector/22958", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32946 - Mastodon Playlist Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32946 \nPublished : April 15, 2025, 1:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : This vulnerability allows any attacker to add playlists to a different user\u2019s channel using the ActivityPub protocol. The vulnerable code sets the owner of the new playlist to be the user who performed the request, and then sets the associated channel to the channel ID supplied by the request, without checking if it belongs to the user. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T17:26:38.000000Z"}</description>
      <content:encoded>{"uuid": "34d07003-9bd0-4604-adfe-62ba142fd700", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32946", "type": "seen", "source": "https://t.me/cvedetector/22958", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32946 - Mastodon Playlist Hijacking Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32946 \nPublished : April 15, 2025, 1:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : This vulnerability allows any attacker to add playlists to a different user\u2019s channel using the ActivityPub protocol. The vulnerable code sets the owner of the new playlist to be the user who performed the request, and then sets the associated channel to the channel ID supplied by the request, without checking if it belongs to the user. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T17:26:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/34d07003-9bd0-4604-adfe-62ba142fd700/export</guid>
      <pubDate>Tue, 15 Apr 2025 17:26:38 +0000</pubDate>
    </item>
    <item>
      <title>5cea03e2-a947-4361-ba1e-f574fd60162d</title>
      <link>https://vulnerability.circl.lu/sighting/5cea03e2-a947-4361-ba1e-f574fd60162d/export</link>
      <description>{"uuid": "5cea03e2-a947-4361-ba1e-f574fd60162d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32948", "type": "seen", "source": "https://t.me/cvedetector/22970", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32948 - PeerTube Blind SSRF and DoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32948 \nPublished : April 15, 2025, 3:16 p.m. | 2\u00a0hours ago \nDescription : The vulnerability allows any attacker to cause the PeerTube server to stop functioning, or in special cases send requests to arbitrary URLs (Blind SSRF). Attackers can send\u00a0ActivityPub activities to PeerTube's \"inbox\" endpoint. By abusing the \"Create Activity\" functionality, it is possible to create crafted playlists which will cause either denial of service or an attacker-controlled blind SSRF. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T19:57:10.000000Z"}</description>
      <content:encoded>{"uuid": "5cea03e2-a947-4361-ba1e-f574fd60162d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32948", "type": "seen", "source": "https://t.me/cvedetector/22970", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32948 - PeerTube Blind SSRF and DoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32948 \nPublished : April 15, 2025, 3:16 p.m. | 2\u00a0hours ago \nDescription : The vulnerability allows any attacker to cause the PeerTube server to stop functioning, or in special cases send requests to arbitrary URLs (Blind SSRF). Attackers can send\u00a0ActivityPub activities to PeerTube's \"inbox\" endpoint. By abusing the \"Create Activity\" functionality, it is possible to create crafted playlists which will cause either denial of service or an attacker-controlled blind SSRF. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T19:57:10.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/5cea03e2-a947-4361-ba1e-f574fd60162d/export</guid>
      <pubDate>Tue, 15 Apr 2025 19:57:10 +0000</pubDate>
    </item>
    <item>
      <title>7a7823cd-eebf-4c4b-842e-93c08b570fbc</title>
      <link>https://vulnerability.circl.lu/sighting/7a7823cd-eebf-4c4b-842e-93c08b570fbc/export</link>
      <description>{"uuid": "7a7823cd-eebf-4c4b-842e-93c08b570fbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32949", "type": "seen", "source": "https://t.me/cvedetector/22971", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32949 - PeerTube Zip Bomb Extraction Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-32949 \nPublished : April 15, 2025, 3:16 p.m. | 2\u00a0hours ago \nDescription : This vulnerability allows any authenticated user to cause the server to consume very large amounts of disk space when extracting a Zip Bomb.   \n  \nIf user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. The yauzl library does not contain any mechanism to detect or prevent extraction of a  Zip Bomb  . Therefore, when using the User Import functionality with a Zip Bomb, PeerTube will try extracting the archive which will cause a disk space resource exhaustion. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T19:57:11.000000Z"}</description>
      <content:encoded>{"uuid": "7a7823cd-eebf-4c4b-842e-93c08b570fbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32949", "type": "seen", "source": "https://t.me/cvedetector/22971", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32949 - PeerTube Zip Bomb Extraction Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-32949 \nPublished : April 15, 2025, 3:16 p.m. | 2\u00a0hours ago \nDescription : This vulnerability allows any authenticated user to cause the server to consume very large amounts of disk space when extracting a Zip Bomb.   \n  \nIf user import is enabled (which is the default setting), any registered user can upload an archive for importing. The code uses the yauzl library for reading the archive. The yauzl library does not contain any mechanism to detect or prevent extraction of a  Zip Bomb  . Therefore, when using the User Import functionality with a Zip Bomb, PeerTube will try extracting the archive which will cause a disk space resource exhaustion. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T19:57:11.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/7a7823cd-eebf-4c4b-842e-93c08b570fbc/export</guid>
      <pubDate>Tue, 15 Apr 2025 19:57:11 +0000</pubDate>
    </item>
    <item>
      <title>a1e15866-3c30-4e89-bead-a59590891831</title>
      <link>https://vulnerability.circl.lu/sighting/a1e15866-3c30-4e89-bead-a59590891831/export</link>
      <description>{"uuid": "a1e15866-3c30-4e89-bead-a59590891831", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32947", "type": "seen", "source": "https://t.me/cvedetector/22974", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32947 - PeerTube ActivityPub Infinite Loop Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-32947 \nPublished : April 15, 2025, 3:16 p.m. | 2\u00a0hours ago \nDescription : This vulnerability allows any attacker to cause the PeerTube server to stop responding to requests due to an infinite loop in the \"inbox\" endpoint when\u00a0receiving crafted ActivityPub activities. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T19:57:16.000000Z"}</description>
      <content:encoded>{"uuid": "a1e15866-3c30-4e89-bead-a59590891831", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32947", "type": "seen", "source": "https://t.me/cvedetector/22974", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32947 - PeerTube ActivityPub Infinite Loop Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-32947 \nPublished : April 15, 2025, 3:16 p.m. | 2\u00a0hours ago \nDescription : This vulnerability allows any attacker to cause the PeerTube server to stop responding to requests due to an infinite loop in the \"inbox\" endpoint when\u00a0receiving crafted ActivityPub activities. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T19:57:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/a1e15866-3c30-4e89-bead-a59590891831/export</guid>
      <pubDate>Tue, 15 Apr 2025 19:57:16 +0000</pubDate>
    </item>
    <item>
      <title>47c72779-2275-4449-b1b8-74962c7d749d</title>
      <link>https://vulnerability.circl.lu/sighting/47c72779-2275-4449-b1b8-74962c7d749d/export</link>
      <description>{"uuid": "47c72779-2275-4449-b1b8-74962c7d749d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3294", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3294\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The WP Editor plugin for WordPress is vulnerable to arbitrary file update due to missing file path validation in all versions up to, and including, 1.2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to overwrite arbitrary files on the affected site's server which may make remote code execution possible assuming the files can be written to by the web server.\n\ud83d\udccf Published: 2025-04-17T05:23:19.895Z\n\ud83d\udccf Modified: 2025-04-17T05:23:19.895Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/9298820e-3753-41b3-8ba6-9fb494e215a8?source=cve\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;amp;sfph_mail=&amp;amp;reponame=&amp;amp;new=3269832%40wp-editor%2Ftrunk&amp;amp;old=3151053%40wp-editor%2Ftrunk&amp;amp;sfp_email=&amp;amp;sfph_mail=", "creation_timestamp": "2025-04-17T05:57:31.000000Z"}</description>
      <content:encoded>{"uuid": "47c72779-2275-4449-b1b8-74962c7d749d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3294", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3294\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The WP Editor plugin for WordPress is vulnerable to arbitrary file update due to missing file path validation in all versions up to, and including, 1.2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to overwrite arbitrary files on the affected site's server which may make remote code execution possible assuming the files can be written to by the web server.\n\ud83d\udccf Published: 2025-04-17T05:23:19.895Z\n\ud83d\udccf Modified: 2025-04-17T05:23:19.895Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/9298820e-3753-41b3-8ba6-9fb494e215a8?source=cve\n2. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;amp;sfph_mail=&amp;amp;reponame=&amp;amp;new=3269832%40wp-editor%2Ftrunk&amp;amp;old=3151053%40wp-editor%2Ftrunk&amp;amp;sfp_email=&amp;amp;sfph_mail=", "creation_timestamp": "2025-04-17T05:57:31.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/47c72779-2275-4449-b1b8-74962c7d749d/export</guid>
      <pubDate>Thu, 17 Apr 2025 05:57:31 +0000</pubDate>
    </item>
    <item>
      <title>3b35820b-5cca-4a4a-8d71-f1b1bdfc11b1</title>
      <link>https://vulnerability.circl.lu/sighting/3b35820b-5cca-4a4a-8d71-f1b1bdfc11b1/export</link>
      <description>{"uuid": "3b35820b-5cca-4a4a-8d71-f1b1bdfc11b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3294", "type": "seen", "source": "Telegram/KHvZb7SVH2K5_8Bc8qiYUEiI7_56IhJKHfcQjRiAZ8pY63k", "content": "", "creation_timestamp": "2025-04-17T08:00:21.000000Z"}</description>
      <content:encoded>{"uuid": "3b35820b-5cca-4a4a-8d71-f1b1bdfc11b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3294", "type": "seen", "source": "Telegram/KHvZb7SVH2K5_8Bc8qiYUEiI7_56IhJKHfcQjRiAZ8pY63k", "content": "", "creation_timestamp": "2025-04-17T08:00:21.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3b35820b-5cca-4a4a-8d71-f1b1bdfc11b1/export</guid>
      <pubDate>Thu, 17 Apr 2025 08:00:21 +0000</pubDate>
    </item>
    <item>
      <title>93f778c8-fdf1-40b5-81f3-80f4c3b1a69c</title>
      <link>https://vulnerability.circl.lu/sighting/93f778c8-fdf1-40b5-81f3-80f4c3b1a69c/export</link>
      <description>{"uuid": "93f778c8-fdf1-40b5-81f3-80f4c3b1a69c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3294", "type": "seen", "source": "https://t.me/cvedetector/23221", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3294 - WordPress WP Editor Remote File Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3294 \nPublished : April 17, 2025, 6:15 a.m. | 1\u00a0hour, 56\u00a0minutes ago \nDescription : The WP Editor plugin for WordPress is vulnerable to arbitrary file update due to missing file path validation in all versions up to, and including, 1.2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to overwrite arbitrary files on the affected site's server which may make remote code execution possible assuming the files can be written to by the web server. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T10:28:17.000000Z"}</description>
      <content:encoded>{"uuid": "93f778c8-fdf1-40b5-81f3-80f4c3b1a69c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3294", "type": "seen", "source": "https://t.me/cvedetector/23221", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3294 - WordPress WP Editor Remote File Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3294 \nPublished : April 17, 2025, 6:15 a.m. | 1\u00a0hour, 56\u00a0minutes ago \nDescription : The WP Editor plugin for WordPress is vulnerable to arbitrary file update due to missing file path validation in all versions up to, and including, 1.2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to overwrite arbitrary files on the affected site's server which may make remote code execution possible assuming the files can be written to by the web server. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T10:28:17.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/93f778c8-fdf1-40b5-81f3-80f4c3b1a69c/export</guid>
      <pubDate>Thu, 17 Apr 2025 10:28:17 +0000</pubDate>
    </item>
    <item>
      <title>61bd6650-5e82-411a-a398-cdab1e6535c1</title>
      <link>https://vulnerability.circl.lu/sighting/61bd6650-5e82-411a-a398-cdab1e6535c1/export</link>
      <description>{"uuid": "61bd6650-5e82-411a-a398-cdab1e6535c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32944", "type": "seen", "source": "https://gist.github.com/airalien999/1b7dca5b6aaf83218850346361fe173a", "content": "", "creation_timestamp": "2025-07-17T18:35:22.000000Z"}</description>
      <content:encoded>{"uuid": "61bd6650-5e82-411a-a398-cdab1e6535c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32944", "type": "seen", "source": "https://gist.github.com/airalien999/1b7dca5b6aaf83218850346361fe173a", "content": "", "creation_timestamp": "2025-07-17T18:35:22.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/61bd6650-5e82-411a-a398-cdab1e6535c1/export</guid>
      <pubDate>Thu, 17 Jul 2025 18:35:22 +0000</pubDate>
    </item>
    <item>
      <title>3f8c0c21-c6ce-4f62-ab64-14bade626322</title>
      <link>https://vulnerability.circl.lu/sighting/3f8c0c21-c6ce-4f62-ab64-14bade626322/export</link>
      <description>{"uuid": "3f8c0c21-c6ce-4f62-ab64-14bade626322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32942", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115306153304397687", "content": "", "creation_timestamp": "2025-10-02T19:11:11.831338Z"}</description>
      <content:encoded>{"uuid": "3f8c0c21-c6ce-4f62-ab64-14bade626322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32942", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115306153304397687", "content": "", "creation_timestamp": "2025-10-02T19:11:11.831338Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/3f8c0c21-c6ce-4f62-ab64-14bade626322/export</guid>
      <pubDate>Thu, 02 Oct 2025 19:11:11 +0000</pubDate>
    </item>
  </channel>
</rss>
