{"vulnerability": "CVE-2025-23363", "sightings": [{"uuid": "e3815759-cdba-4cc9-a00b-6bb5a3c9b16d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23363", "type": "seen", "source": "https://bsky.app/profile/helpnetsecurity.com/post/3lj5mucsqus2a", "content": "", "creation_timestamp": "2025-02-27T09:56:39.919519Z"}, {"uuid": "3f689f0c-224f-44c5-bc72-3ccc7d294a31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23363", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3ljfb5aelxc2s", "content": "", "creation_timestamp": "2025-03-02T10:48:11.415833Z"}, {"uuid": "39425147-3580-4cb4-af6c-ef339483e534", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23363", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113984882074735533", "content": "", "creation_timestamp": "2025-02-11T10:54:32.506345Z"}, {"uuid": "c7483780-86b1-43ec-9592-38eefce786e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23363", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhvjtq4cxr2o", "content": "", "creation_timestamp": "2025-02-11T11:16:05.270153Z"}, {"uuid": "bac623f1-a521-4055-a8c4-a7d9756ed555", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23363", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhvu4pp7ss2h", "content": "", "creation_timestamp": "2025-02-11T14:20:07.912191Z"}, {"uuid": "257caf92-6f91-4cda-8888-ba920cd1df43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23363", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5316", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23363\n\ud83d\udd25 CVSS Score: 7.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in Teamcenter (All versions). The SSO login service of affected applications accepts user-controlled input that could specify a link to an external site. This could allow an attacker to redirect the legitimate user to an attacker-chosen URL to steal valid session data. For a successful exploit, the legitimate user must actively click on an attacker-crafted link.\n\ud83d\udccf Published: 2025-02-11T10:29:02.933Z\n\ud83d\udccf Modified: 2025-02-25T16:12:02.182Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-656895.html", "creation_timestamp": "2025-02-25T16:23:00.000000Z"}, {"uuid": "1d4e5b9d-7e68-4a98-82d1-1ae48f372d5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23363", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-07", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "4a6de8a1-0855-4a73-b386-ba447bc2bc1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23363", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ljg2ghyhwy2e", "content": "", "creation_timestamp": "2025-03-02T18:20:42.122628Z"}, {"uuid": "c8bd9472-9ae2-4a37-97cf-ff35ae3422c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23363", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:28.000000Z"}, {"uuid": "e39fba2b-0edf-41be-bd06-7609e9a0fe6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23363", "type": "seen", "source": "https://t.me/cvedetector/17691", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23363 - \"Teamcenter Open-Redirect Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-23363 \nPublished : Feb. 11, 2025, 11:15 a.m. | 52\u00a0minutes ago \nDescription : A vulnerability has been identified in Teamcenter (All versions &lt; V14.3.0.0). The SSO login service of affected applications accepts user-controlled input that could specify a link to an external site. This could allow an attacker to redirect the legitimate user to an attacker-chosen URL to steal valid session data. For a successful exploit, the legitimate user must actively click on an attacker-crafted link. \nSeverity: 7.4 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T13:10:21.000000Z"}, {"uuid": "73d9e36b-19f5-4b11-9af7-8cc9abe0bf83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23363", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17904", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23363\n\ud83d\udd25 CVSS Score: 7.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: A vulnerability has been identified in Teamcenter V14.1 (All versions), Teamcenter V14.2 (All versions), Teamcenter V14.3 (All versions &lt; V14.3.0.14), Teamcenter V2312 (All versions &lt; V2312.0010), Teamcenter V2406 (All versions &lt; V2406.0008), Teamcenter V2412 (All versions &lt; V2412.0004). The SSO login service of affected applications accepts user-controlled input that could specify a link to an external site. This could allow an attacker to redirect the legitimate user to an attacker-chosen URL to steal valid session data. For a successful exploit, the legitimate user must actively click on an attacker-crafted link.\n\ud83d\udccf Published: 2025-02-11T10:29:02.933Z\n\ud83d\udccf Modified: 2025-06-10T15:17:22.287Z\n\ud83d\udd17 References:\n1. https://cert-portal.siemens.com/productcert/html/ssa-656895.html", "creation_timestamp": "2025-06-10T15:31:01.000000Z"}, {"uuid": "5bfa8b09-d730-48e2-ae2d-dca1d1fa5b20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23363", "type": "seen", "source": "Telegram/-R7DPWRFZFRe6wuiqdIPAXrcDZz9bne6krKvLYq0S2GRcFU", "content": "", "creation_timestamp": "2025-02-11T12:32:32.000000Z"}]}