{"vulnerability": "CVE-2025-22130", "sightings": [{"uuid": "a92a320a-b3ec-47f7-9261-6869eca16827", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22130", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113793510200311392", "content": "", "creation_timestamp": "2025-01-08T15:46:09.282575Z"}, {"uuid": "00a14f27-0ad1-4725-bc86-c75af8262a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22130", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfakrb4vc52i", "content": "", "creation_timestamp": "2025-01-08T16:16:18.544813Z"}, {"uuid": "d1e236d7-c533-4b15-bfd4-a11add1a9232", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22130", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfamb4mgcr2w", "content": "", "creation_timestamp": "2025-01-08T16:43:05.296438Z"}, {"uuid": "de1bbf85-271b-4b18-8c5b-5f18094c46c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22130", "type": "seen", "source": "https://t.me/cvedetector/14689", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22130 - Soft Serve Git Server Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22130 \nPublished : Jan. 8, 2025, 4:15 p.m. | 43\u00a0minutes ago \nDescription : Soft Serve is a self-hostable Git server for the command line. Prior to 0.8.2 , a path traversal attack allows existing non-admin users to access and take over other user's repositories. A malicious user then can modify, delete, and arbitrarily repositories as if they were an admin user without explicitly giving them permissions. This is patched in v0.8.2. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-08T18:19:07.000000Z"}]}