{"vulnerability": "CVE-2025-1243", "sightings": [{"uuid": "2acb7ab9-7b6a-4f74-9e15-d5fe4a5a112f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1243", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113988108719755345", "content": "", "creation_timestamp": "2025-02-12T00:35:07.371823Z"}, {"uuid": "2a89dfb2-b20d-4567-a636-93afb92489b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1243", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113988126409380954", "content": "", "creation_timestamp": "2025-02-12T00:39:36.920462Z"}, {"uuid": "38fc9925-dd49-4ce1-bd3d-c0fd27113619", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1243", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhwyrioohr2p", "content": "", "creation_timestamp": "2025-02-12T01:15:56.378980Z"}, {"uuid": "310a700d-e96d-4d66-85ad-49279c672acf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12432", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5clpg2b4p2s", "content": "", "creation_timestamp": "2025-11-10T21:43:08.720967Z"}, {"uuid": "cd3e41d6-c5df-4d5c-b38f-50e26afefaaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1243", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhxddbk4jn2n", "content": "", "creation_timestamp": "2025-02-12T04:24:52.941815Z"}, {"uuid": "dc9e00c1-0a3e-4f4f-bd31-08b08e5da616", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1243", "type": "seen", "source": "https://gist.github.com/Anvils/ff00a30096be4a359ed5b87bba18274f", "content": "", "creation_timestamp": "2025-07-16T11:12:39.000000Z"}, {"uuid": "ff177cbf-5845-497c-b0bb-5bac77d6bf64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12438", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m5clr7l44a2u", "content": "", "creation_timestamp": "2025-11-10T21:44:09.241762Z"}, {"uuid": "e28fa828-901b-4915-9e04-550d769cb395", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12432", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m5crfr762s52", "content": "", "creation_timestamp": "2025-11-10T23:25:33.676312Z"}, {"uuid": "e19712b1-2efc-41b3-a126-eb7a70860775", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12438", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3m5crg3z7qp72", "content": "", "creation_timestamp": "2025-11-10T23:25:44.872717Z"}, {"uuid": "354dbc4c-4b8e-4d25-bdf2-631876f2a84f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12430", "type": "seen", "source": "https://gist.github.com/Darkcrai86/d421e571c7803316df3a13554c78a8e8", "content": "", "creation_timestamp": "2025-11-03T08:31:39.000000Z"}, {"uuid": "ac09d447-19b6-4358-9c12-a8acb4e959fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12434", "type": "seen", "source": "https://gist.github.com/Darkcrai86/89514af9a1abec5cdf80410143641e3f", "content": "", "creation_timestamp": "2025-11-03T08:29:55.000000Z"}, {"uuid": "b732df37-8020-4cf8-beeb-1568516b45f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12438", "type": "seen", "source": "https://gist.github.com/Darkcrai86/76d795e531836dad5246bd02bb377da8", "content": "", "creation_timestamp": "2025-11-03T08:31:10.000000Z"}, {"uuid": "75c651f8-40fa-4fae-be41-9182992af1f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12432", "type": "seen", "source": "https://gist.github.com/Darkcrai86/1d4282095f8cc1f70e937aec40b71172", "content": "", "creation_timestamp": "2025-11-03T08:32:01.000000Z"}, {"uuid": "756bbade-9f19-4b82-82fe-62c0eed5292b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1243", "type": "seen", "source": "https://gist.github.com/dstrigel/fcc50ab84f85c02e9c17accc540aeeaa", "content": "", "creation_timestamp": "2025-11-17T20:18:24.000000Z"}, {"uuid": "81248232-2dcd-4fa2-8643-3b15f88626e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12437", "type": "seen", "source": "https://gist.github.com/Darkcrai86/558c7a72853f275608e30f5bd70b5fc0", "content": "", "creation_timestamp": "2025-11-03T08:30:48.000000Z"}, {"uuid": "d21c13f8-a24c-4dff-b51e-bc001404d050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12436", "type": "seen", "source": "https://gist.github.com/Darkcrai86/c58a1fca50cbaecc37ac329a5eddb7b2", "content": "", "creation_timestamp": "2025-11-03T08:30:28.000000Z"}, {"uuid": "964ab6eb-616d-40a2-9443-948f37fb7790", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1243", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3998", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1243\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The Temporal api-go library prior to version 1.44.1 did not send `update response` information to Data Converter when the proxy package within the api-go module was used in a gRPC proxy prior to transmission. This resulted in\u00a0information contained within the `update response` field not having Data Converter transformations (e.g. encryption) applied. This is an issue only when using the UpdateWorkflowExecution APIs (released on 13th January 2025)  with a proxy leveraging the api-go library before version 1.44.1.\n\nOther data fields were correctly sent to Data Converter. This issue does not impact the Data Converter server. Data was encrypted in transit. Temporal Cloud services are not impacted.\n\ud83d\udccf Published: 2025-02-12T03:31:14Z\n\ud83d\udccf Modified: 2025-02-12T03:31:14Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-1243\n2. https://github.com/temporalio/api-go/releases/tag/v1.44.1\n3. https://temporal.io/blog/announcing-a-new-operation-workflow-update", "creation_timestamp": "2025-02-12T04:08:33.000000Z"}, {"uuid": "807aeae2-0ad0-451d-b745-de594719af44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-12432", "type": "seen", "source": "https://gist.github.com/EbonJaeger/d35ee8e23d9e45964fc3a86bc738c87d", "content": "", "creation_timestamp": "2026-02-06T19:21:38.000000Z"}, {"uuid": "e46318c7-5953-4f19-910f-00646f305b84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1243", "type": "seen", "source": "https://t.me/cvedetector/17794", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1243 - Temporal api-go Library Unencrypted Update Response Exfiltration in gRPC Proxy\", \n  \"Content\": \"CVE ID : CVE-2025-1243 \nPublished : Feb. 12, 2025, 1:15 a.m. | 1\u00a0hour, 16\u00a0minutes ago \nDescription : The Temporal api-go library prior to version 1.44.1 did not send `update response` information to Data Converter when the proxy package within the api-go module was used in a gRPC proxy prior to transmission. This resulted in\u00a0information contained within the `update response` field not having Data Converter transformations (e.g. encryption) applied. This is an issue only when using the UpdateWorkflowExecution APIs (released on 13th January 2025)  with a proxy leveraging the api-go library before version 1.44.1.  \n  \nOther data fields were correctly sent to Data Converter. This issue does not impact the Data Converter server. Data was encrypted in transit. Temporal Cloud services are not impacted. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-12T04:19:16.000000Z"}, {"uuid": "856ef5bf-03b5-4bef-a68f-993a2fed5bae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-1243", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3991", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-1243\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-12T01:15:09.073\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://github.com/temporalio/api-go/releases/tag/v1.44.1\n2. https://temporal.io/blog/announcing-a-new-operation-workflow-update", "creation_timestamp": "2025-02-12T03:09:09.000000Z"}]}