{"vulnerability": "CVE-2025-2277", "sightings": [{"uuid": "0a767812-11da-476e-82cd-52d17a6ec280", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22773", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113833535455234464", "content": "", "creation_timestamp": "2025-01-15T17:25:06.143583Z"}, {"uuid": "ba079159-fe27-4b81-b0d0-91a17c303992", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22776", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113833594456988570", "content": "", "creation_timestamp": "2025-01-15T17:40:06.609645Z"}, {"uuid": "fae93108-3d02-4fa7-873d-e3c1b13b18b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22778", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113833594472067531", "content": "", "creation_timestamp": "2025-01-15T17:40:06.970623Z"}, {"uuid": "55f52a5e-455b-4f43-8b4a-e116c5d53f4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22779", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113833594486531040", "content": "", "creation_timestamp": "2025-01-15T17:40:07.171394Z"}, {"uuid": "49055db5-27a1-482d-a137-89d2a1dd1791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22776", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfs63uolka2h", "content": "", "creation_timestamp": "2025-01-15T16:17:31.183424Z"}, {"uuid": "e04df188-943a-4c23-8cf8-2aa6b552490e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22777", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lfj4t5mkxy2m", "content": "", "creation_timestamp": "2025-01-12T02:00:47.233624Z"}, {"uuid": "2c17b2a2-d607-4c8f-857c-ec27a4a81da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22777", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lfjdtjnyzk27", "content": "", "creation_timestamp": "2025-01-12T04:06:22.051472Z"}, {"uuid": "e72975d6-8102-4cde-94c8-33cef93a12f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22777", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lfjrqkoohc2l", "content": "", "creation_timestamp": "2025-01-12T08:15:09.898072Z"}, {"uuid": "94d09017-5aa8-41a4-b928-e8abe13e629c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22779", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfs63znpyb2t", "content": "", "creation_timestamp": "2025-01-15T16:17:36.474036Z"}, {"uuid": "b3bb7296-ce36-4d0f-9b9b-af0673e8a8f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22773", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfs63re5wr2t", "content": "", "creation_timestamp": "2025-01-15T16:17:28.027584Z"}, {"uuid": "908719fb-29de-4550-b3cf-3e89a0990be2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22778", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfs63xcxma2b", "content": "", "creation_timestamp": "2025-01-15T16:17:33.846742Z"}, {"uuid": "8ecf745d-66f9-4040-9b77-6cd3eefef6ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22777", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfmwfcstea2d", "content": "", "creation_timestamp": "2025-01-13T14:16:19.477357Z"}, {"uuid": "9cd13ee4-ad80-4b3f-ac80-920dde74b5d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22777", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113821595020498401", "content": "", "creation_timestamp": "2025-01-13T14:48:37.949247Z"}, {"uuid": "7033b993-3134-492b-9d97-a5f1fb741dec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22779", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfsae7ptav2e", "content": "", "creation_timestamp": "2025-01-15T16:57:58.979203Z"}, {"uuid": "27026712-56ca-471b-8d4b-e3fa57ea53b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22775", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhbtlavgf32j", "content": "", "creation_timestamp": "2025-02-03T15:17:03.480472Z"}, {"uuid": "86fb9d93-cd4d-4a58-943b-d04adbb5c12d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22772", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgdnzomrqo27", "content": "", "creation_timestamp": "2025-01-22T15:17:53.033292Z"}, {"uuid": "8dedb0dc-f09d-43e1-ae29-494a0e5ca5f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22775", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113940708336652754", "content": "", "creation_timestamp": "2025-02-03T15:40:34.618126Z"}, {"uuid": "7d611b39-5615-45c4-8656-65094c94788c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2277", "type": "seen", "source": "https://t.me/cvedetector/20206", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2277 - Devolutions Server SSH Password Exposure\", \n  \"Content\": \"CVE ID : CVE-2025-2277 \nPublished : March 13, 2025, 1:15 p.m. | 40\u00a0minutes ago \nDescription : Exposure of password in web-based SSH authentication component in Devolutions Server 2024.3.13 and earlier allows a user to unadvertently leak his SSH password due to missing password masking. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-13T15:36:59.000000Z"}, {"uuid": "817ff7e8-2459-4445-8c4f-a25866c53be4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22777", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lzyvtqyemg2a", "content": "", "creation_timestamp": "2025-09-29T21:02:21.150469Z"}, {"uuid": "e9bda732-379e-4b31-9c79-90a17bf9faa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22777", "type": "published-proof-of-concept", "source": "Telegram/z9DGbqT3Td0sjac5HrlGnLNNWdwHQu54vaHacANsB7HUq-U", "content": "", "creation_timestamp": "2025-12-29T21:00:05.000000Z"}, {"uuid": "b52c81fb-db34-4af7-bc5c-7303f6e4e6ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2277", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7928", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2277\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Exposure of password in web-based SSH authentication component in Devolutions Server 2024.3.13 and earlier allows a user to unadvertently leak his SSH password due to missing password masking.\n\ud83d\udccf Published: 2025-03-13T12:47:02.631Z\n\ud83d\udccf Modified: 2025-03-18T16:30:53.932Z\n\ud83d\udd17 References:\n1. https://devolutions.net/security/advisories/DEVO-2025-0004/", "creation_timestamp": "2025-03-18T16:51:16.000000Z"}, {"uuid": "e4f4b4c6-7734-470e-becc-3521d413298e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22777", "type": "seen", "source": "https://t.me/CyberBulletin/2046", "content": "\u26a1\ufe0fCVE-2025-22777 (CVSS 9.8): Critical Security Alert for GiveWP Plugin with 100,000 Active Installations.\n\n#CyberBulletin", "creation_timestamp": "2025-01-12T05:12:37.000000Z"}, {"uuid": "4c86cd92-3638-4fd1-8915-a44da1f5770b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22779", "type": "seen", "source": "https://t.me/cvedetector/15480", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22779 - Ugur CELIK WP News Sliders Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22779 \nPublished : Jan. 15, 2025, 4:15 p.m. | 18\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Ugur CELIK WP News Sliders allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP News Sliders: from n/a through 1.0. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T17:38:19.000000Z"}, {"uuid": "4de36c5b-4648-4a7d-8c15-bea79d33b62c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22777", "type": "seen", "source": "https://t.me/cvedetector/15136", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22777 - GiveWP Object Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22777 \nPublished : Jan. 13, 2025, 2:15 p.m. | 38\u00a0minutes ago \nDescription : Deserialization of Untrusted Data vulnerability in GiveWP GiveWP allows Object Injection.This issue affects GiveWP: from n/a through 3.19.3. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-13T16:14:07.000000Z"}, {"uuid": "46d0a834-b73a-427d-8e8d-bf52159afc76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22778", "type": "seen", "source": "https://t.me/cvedetector/15479", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22778 - Lijit Networks Inc. and Crowd Favorite Lijit Search Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-22778 \nPublished : Jan. 15, 2025, 4:15 p.m. | 18\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lijit Networks Inc. and Crowd Favorite Lijit Search allows Reflected XSS.This issue affects Lijit Search: from n/a through 1.1. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T17:38:19.000000Z"}, {"uuid": "0605f77b-348b-4eb1-a20b-f90d0f658f62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22776", "type": "seen", "source": "https://t.me/cvedetector/15478", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22776 - Jay Carter WP Bulletin Board Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-22776 \nPublished : Jan. 15, 2025, 4:15 p.m. | 18\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jay Carter WP Bulletin Board allows Reflected XSS.This issue affects WP Bulletin Board: from n/a through 1.1.4. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T17:38:18.000000Z"}, {"uuid": "c132f1cb-89fc-4983-a8c6-1953c3e5d578", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22773", "type": "seen", "source": "https://t.me/cvedetector/15482", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22773 - WPChill Htaccess File Editor Sensitive Information Expose\", \n  \"Content\": \"CVE ID : CVE-2025-22773 \nPublished : Jan. 15, 2025, 4:15 p.m. | 18\u00a0minutes ago \nDescription : Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in WPChill Htaccess File Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Htaccess File Editor: from n/a through 1.0.19. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-15T17:38:24.000000Z"}, {"uuid": "48ac5363-1e85-461c-acc5-b229ebb73c24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-22777", "type": "seen", "source": "https://t.me/suboxone_chatroom/945", "content": "CVE-2025-22777: Privilege Escalation in GiveWP WordPress Plugin, 9.8 rating \ud83d\udd25\n\nUnauthenticated PHP Object Injection allows attackers to take control of websites.\n\nSearch at Netlas.io:\n\ud83d\udc49 Link: https://nt.ls/amyWM\n\ud83d\udc49 Dork: http.body:\"plugins/give/assets/dist\"\n\nRead more: https://patchstack.com/articles/critical-vulnerability-patched-in-givewp-plugin/", "creation_timestamp": "2025-01-13T11:04:46.000000Z"}]}