<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 21:30:44 +0000</lastBuildDate>
    <item>
      <title>6a97b176-be89-4ccf-9e39-bef8dc841057</title>
      <link>https://vulnerability.circl.lu/sighting/6a97b176-be89-4ccf-9e39-bef8dc841057/export</link>
      <description>{"uuid": "6a97b176-be89-4ccf-9e39-bef8dc841057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47778", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16358", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47778\n\ud83d\udd25 CVSS Score: 6.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U)\n\ud83d\udd39 Description: Sulu is an open-source PHP content management system based on the Symfony framework. Starting in versions 2.5.21, 2.6.5, and 3.0.0-alpha1, an admin user can upload SVG which may load external data via XML DOM library. This can be used for insecure XML External Entity References. The problem has been patched in versions 2.6.9, 2.5.25, and 3.0.0-alpha3. As a workaround, one may patch the effect file `src/Sulu/Bundle/MediaBundle/FileInspector/SvgFileInspector.php` manually.\n\ud83d\udccf Published: 2025-05-14T15:29:08.187Z\n\ud83d\udccf Modified: 2025-05-14T18:13:14.564Z\n\ud83d\udd17 References:\n1. https://github.com/sulu/sulu/security/advisories/GHSA-f6rx-hf55-4255\n2. https://github.com/sulu/sulu/commit/02f52fca04eb9495b9b4a0c5cc64cf23bc27f544\n3. https://github.com/sulu/sulu/blob/2.6/src/Sulu/Bundle/MediaBundle/FileInspector/SvgFileInspector.php", "creation_timestamp": "2025-05-14T18:31:54.000000Z"}</description>
      <content:encoded>{"uuid": "6a97b176-be89-4ccf-9e39-bef8dc841057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47778", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16358", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47778\n\ud83d\udd25 CVSS Score: 6.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U)\n\ud83d\udd39 Description: Sulu is an open-source PHP content management system based on the Symfony framework. Starting in versions 2.5.21, 2.6.5, and 3.0.0-alpha1, an admin user can upload SVG which may load external data via XML DOM library. This can be used for insecure XML External Entity References. The problem has been patched in versions 2.6.9, 2.5.25, and 3.0.0-alpha3. As a workaround, one may patch the effect file `src/Sulu/Bundle/MediaBundle/FileInspector/SvgFileInspector.php` manually.\n\ud83d\udccf Published: 2025-05-14T15:29:08.187Z\n\ud83d\udccf Modified: 2025-05-14T18:13:14.564Z\n\ud83d\udd17 References:\n1. https://github.com/sulu/sulu/security/advisories/GHSA-f6rx-hf55-4255\n2. https://github.com/sulu/sulu/commit/02f52fca04eb9495b9b4a0c5cc64cf23bc27f544\n3. https://github.com/sulu/sulu/blob/2.6/src/Sulu/Bundle/MediaBundle/FileInspector/SvgFileInspector.php", "creation_timestamp": "2025-05-14T18:31:54.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/6a97b176-be89-4ccf-9e39-bef8dc841057/export</guid>
      <pubDate>Wed, 14 May 2025 18:31:54 +0000</pubDate>
    </item>
  </channel>
</rss>
