{"vulnerability": "CVE-2025-25226", "sightings": [{"uuid": "fad22682-e6bd-4ed1-8543-16b6e0102f05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25226", "type": "seen", "source": "https://t.me/cvedetector/22486", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25226 - Oracle Database SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-25226 \nPublished : April 8, 2025, 5:15 p.m. | 17\u00a0minutes ago \nDescription : Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. Please note: the affected method is a protected method. It has no usages in the original packages in neither the 2.x nor 3.x branch and therefore the vulnerability in question can not be exploited when using the original database class. However, classes extending the affected class might be affected, if the vulnerable method is used. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T19:51:35.000000Z"}, {"uuid": "fe273341-3935-4ecf-8ff7-51eb902f4fd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25226", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3lmjek4bewb2j", "content": "", "creation_timestamp": "2025-04-11T06:15:15.472515Z"}, {"uuid": "f44495b3-d6c2-4fdd-a158-13d120a329d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25226", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-09-10T07:00:37.000000Z"}, {"uuid": "77a7fc29-7abd-4e27-8e0d-e24e7970d842", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25226", "type": "seen", "source": "MISP/a1f4de80-fff0-4971-8020-da8f70ab57ea", "content": "", "creation_timestamp": "2025-08-09T17:25:37.000000Z"}, {"uuid": "1c48802f-a4ff-4e43-84cf-fb93ad58a3db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25226", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10941", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25226\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper handling of identifiers lead to a SQL injection vulnerability in the quoteNameStr method of the database package. Please note: the affected method is a protected method. It has no usages in the original packages in neither the 2.x nor 3.x branch and therefore the vulnerability in question can not be exploited when using the original database class. However, classes extending the affected class might be affected, if the vulnerable method is used.\n\ud83d\udccf Published: 2025-04-08T16:24:34.710Z\n\ud83d\udccf Modified: 2025-04-08T16:24:34.710Z\n\ud83d\udd17 References:\n1. https://developer.joomla.org/security-centre/963-20250401-framework-sql-injection-vulnerability-in-quotenamestr-method-of-database-package.html", "creation_timestamp": "2025-04-08T16:46:30.000000Z"}, {"uuid": "673dd537-7df0-47c4-861c-6d19d771fb99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25226", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmp227v4vc2q", "content": "", "creation_timestamp": "2025-04-13T12:23:25.880478Z"}, {"uuid": "f89bc42f-f5c1-47e4-bc34-c8d4b6384b2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25226", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmp22c2wc22q", "content": "", "creation_timestamp": "2025-04-13T12:23:27.070350Z"}, {"uuid": "096bf1b5-5833-419d-a721-517cc1dbf83a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25226", "type": "exploited", "source": "https://t.me/jj_8tl/206", "content": "\u26a1\ufe0fThe vulnerability details are now available: https://t.co/l3fmrvL8hO\n\n\ud83d\udea8\ud83d\udea8Two Critical Vulnerabilities in Joomla\n CVE-2025-25226: SQL injection flaw in quoteNameStr. Mishandled identifiers could let attackers manipulate your database.\nCVE-2025-25227: MFA bypass alert! Hackers could slip past multi-factor authentication, unlocking sensitive accounts.  \n\nZoomEye Dork\ud83d\udc49app=\"Joomla\"\nReveals 127.9k+ potentially exposed sites.\nZoomEye Link: https://t.co/deNA8NE7Fj\n\nRefer: https://t.co/yImcvH3thZ\n\n#ZoomEye #NetSecMapping #cybersecurity #CyberSpaceInsights2025\n\n\u2728 Shared via Awham AutoFeed \u2728\nChannel: @jj_8tl", "creation_timestamp": "2025-04-11T12:07:56.000000Z"}]}