{"vulnerability": "CVE-2025-25288", "sightings": [{"uuid": "4645b313-ef19-4cc7-8756-4761a54fb90e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25288", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114003936399738557", "content": "", "creation_timestamp": "2025-02-14T19:40:18.280023Z"}, {"uuid": "b1dafeee-3aba-46d5-940c-dd5181ffbfa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25288", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5zfpufoi2y", "content": "", "creation_timestamp": "2025-02-14T20:15:53.278934Z"}, {"uuid": "2c7d17c3-7f9f-4820-bb59-140967915eb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25288", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li6bzmqmlk2v", "content": "", "creation_timestamp": "2025-02-14T22:50:11.215665Z"}, {"uuid": "f8ecb75d-7dac-4ea2-b9d1-dd7c40d1ce54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25288", "type": "seen", "source": "https://t.me/cvedetector/18146", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-25288 - Octokit Plugin Paginate Rest ReDoS Attack\", \n  \"Content\": \"CVE ID : CVE-2025-25288 \nPublished : Feb. 14, 2025, 8:15 p.m. | 2\u00a0hours, 13\u00a0minutes ago \nDescription : @octokit/plugin-paginate-rest is the Octokit plugin to paginate REST API endpoint responses. For versions starting in 1.0.0 and prior to 11.4.1 of the npm package `@octokit/plugin-paginate-rest`, when calling `octokit.paginate.iterator()`, a specially crafted `octokit` instance\u2014particularly with a malicious `link` parameter in the `headers` section of the `request`\u2014can trigger a ReDoS attack. Version 11.4.1 contains a fix for the issue. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-15T00:08:48.000000Z"}]}