{"vulnerability": "CVE-2025-22138", "sightings": [{"uuid": "07884251-3f71-4554-b927-f5cb6edeee3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22138", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113822983361272164", "content": "", "creation_timestamp": "2025-01-13T20:41:34.055925Z"}, {"uuid": "9a51e2d9-afde-4050-b23a-e84a02f1f739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22138", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfnnt7obhr2r", "content": "", "creation_timestamp": "2025-01-13T21:15:41.752490Z"}, {"uuid": "3e1f3ab7-cb41-4096-9f4e-15d2aee25683", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22138", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/1404", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22138\n\ud83d\udd39 Description: @codidact/qpixel is a Q&amp;A-based community knowledge-sharing software. In affected versions when a category is set to private or limited-visibility within QPixel's admin tools, suggested edits within this category can still be viewed by unprivileged or anonymous users via the suggested edit queue. This issue has not yet been patched and no workarounds are available. Users are advised to follow the development repo for updates.\n\n### Patches\nNot yet patched.\n\n### Workarounds\nNone available. Private or limited-visibility categories should not be considered ways to store sensitive information.\n\n### References\nInternal: [SUPPORT-114](https://codidact.atlassian.net/issues/SUPPORT-114)\n\ud83d\udccf Published: 2025-01-13T20:34:29.354Z\n\ud83d\udccf Modified: 2025-01-13T20:34:29.354Z\n\ud83d\udd17 References:\n1. https://github.com/codidact/qpixel/security/advisories/GHSA-pv74-hcg9-65r4", "creation_timestamp": "2025-01-13T21:12:32.000000Z"}, {"uuid": "9006cc8e-dba0-4d26-8d62-cc30f58623c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22138", "type": "seen", "source": "https://t.me/cvedetector/15182", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22138 - \"QPixel Suggested Edit Queue Privilege Escalation in Q&amp;A-based Community Knowledge-Sharing Software\"\", \n  \"Content\": \"CVE ID : CVE-2025-22138 \nPublished : Jan. 13, 2025, 9:15 p.m. | 33\u00a0minutes ago \nDescription : @codidact/qpixel is a Q&amp;A-based community knowledge-sharing software. In affected versions when a category is set to private or limited-visibility within QPixel's admin tools, suggested edits within this category can still be viewed by unprivileged or anonymous users via the suggested edit queue. This issue has not yet been patched and no workarounds are available. Users are advised to follow the development repo for updates.  \n  \n### Patches  \nNot yet patched.  \n  \n### Workarounds  \nNone available. Private or limited-visibility categories should not be considered ways to store sensitive information.  \n  \n### References  \nInternal: [SUPPORT-114]() \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T22:56:02.000000Z"}]}