{"vulnerability": "CVE-2025-25227", "sightings": [{"uuid": "388883d7-f229-4d5d-9083-950c01333a9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25227", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10942", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25227\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Insufficient state checks lead to a vector that allows to bypass 2FA checks.\n\ud83d\udccf Published: 2025-04-08T16:24:18.330Z\n\ud83d\udccf Modified: 2025-04-08T16:24:18.330Z\n\ud83d\udd17 References:\n1. https://developer.joomla.org/security-centre/964-20250402-core-mfa-authentication-bypass.html", "creation_timestamp": "2025-04-08T16:46:31.000000Z"}, {"uuid": "23cf4caa-cca8-47c2-b80e-fe9817278cbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25227", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmp227v4vc2q", "content": "", "creation_timestamp": "2025-04-13T12:23:25.974383Z"}, {"uuid": "3a6c95dd-a7fd-45d6-8717-7fa649f2167d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25227", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmp22c2wc22q", "content": "", "creation_timestamp": "2025-04-13T12:23:27.153752Z"}, {"uuid": "05d84e55-b77e-439d-a18e-eed1ae93a7ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25227", "type": "seen", "source": "https://t.me/cvedetector/22487", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25227 - Microsoft Azure Authenticator Two-Factor Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-25227 \nPublished : April 8, 2025, 5:15 p.m. | 17\u00a0minutes ago \nDescription : Insufficient state checks lead to a vector that allows to bypass 2FA checks. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T19:51:39.000000Z"}, {"uuid": "6eba99cb-b960-4f33-a647-2e9015e70eea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25227", "type": "exploited", "source": "https://t.me/jj_8tl/206", "content": "\u26a1\ufe0fThe vulnerability details are now available: https://t.co/l3fmrvL8hO\n\n\ud83d\udea8\ud83d\udea8Two Critical Vulnerabilities in Joomla\n CVE-2025-25226: SQL injection flaw in quoteNameStr. Mishandled identifiers could let attackers manipulate your database.\nCVE-2025-25227: MFA bypass alert! Hackers could slip past multi-factor authentication, unlocking sensitive accounts.  \n\nZoomEye Dork\ud83d\udc49app=\"Joomla\"\nReveals 127.9k+ potentially exposed sites.\nZoomEye Link: https://t.co/deNA8NE7Fj\n\nRefer: https://t.co/yImcvH3thZ\n\n#ZoomEye #NetSecMapping #cybersecurity #CyberSpaceInsights2025\n\n\u2728 Shared via Awham AutoFeed \u2728\nChannel: @jj_8tl", "creation_timestamp": "2025-04-11T12:07:56.000000Z"}]}