{"vulnerability": "CVE-2025-22240", "sightings": [{"uuid": "88ea986d-272c-4137-ba82-28ea758dd7d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22240", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lrhvusayjkx2", "content": "", "creation_timestamp": "2025-06-13T07:28:24.026620Z"}, {"uuid": "d6cedf04-671d-48b9-a779-373906e9f025", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22240", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lriejur26o2m", "content": "", "creation_timestamp": "2025-06-13T11:48:25.643407Z"}, {"uuid": "b7fc632d-1816-43f4-9ea7-850e58905a9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22240", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18273", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22240\n\ud83d\udd25 CVSS Score: 6.3 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Arbitrary directory creation or file deletion. In the find_file method of the GitFS class, a path is created using os.path.join using unvalidated input from the \u201ctgt_env\u201d variable. This can be exploited by an attacker to delete any file on the Master's process has permissions to.\n\ud83d\udccf Published: 2025-06-13T07:03:35.139Z\n\ud83d\udccf Modified: 2025-06-13T07:03:35.139Z\n\ud83d\udd17 References:\n1. https://docs.saltproject.io/en/3006/topics/releases/3006.12.html\n2. https://docs.saltproject.io/en/3007/topics/releases/3007.4.html", "creation_timestamp": "2025-06-13T07:33:13.000000Z"}]}