{"vulnerability": "CVE-2024-25582", "sightings": [{"uuid": "2470209b-7e89-4b43-b000-8ed3f0e4de0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-25582", "type": "seen", "source": "https://t.me/cvedetector/3512", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-25582 - Acorn Product Savepoint Module Unvalidated Injection\", \n  \"Content\": \"CVE ID : CVE-2024-25582 \nPublished : Aug. 19, 2024, 7:15 a.m. | 42\u00a0minutes ago \nDescription : Module savepoints could be abused to inject references to malicious code delivered through the same domain. Attackers could perform malicious API requests or extract information from the users account. Exploiting this vulnerability requires temporary access to an account or successful social engineering to make a user follow a prepared link to a malicious account. Please deploy the provided updates and patch releases. The savepoint module path has been restricted to modules that provide the feature, excluding any arbitrary or non-existing modules. No publicly available exploits are known. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T10:10:29.000000Z"}]}