{"vulnerability": "CVE-2025-2592", "sightings": [{"uuid": "f9fc7c9d-4b8e-46eb-ac05-667e6fd8d060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25928", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7846", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25928\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Cross-Site Request Forgery (CSRF) in the component /admin/users/user.form of Openmrs 2.4.3 Build 0ff0ed allows attackers to execute arbitrary operations via a crafted request. In this case, an attacker could elevate a low-privileged account to an administrative role by leveraging the CSRF vulnerability at the /admin/users/user.form endpoint.\n\ud83d\udccf Published: 2025-03-11T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-17T18:55:54.103Z\n\ud83d\udd17 References:\n1. https://github.com/johnchd/CVEs/blob/main/OpenMRS/CVE-2025-25928%20-%20CSRF%20PrivEsc.md", "creation_timestamp": "2025-03-17T19:47:59.000000Z"}, {"uuid": "9c4c45d9-dd2e-4993-9dc1-7bb56b033a70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25928", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114150716555157480", "content": "", "creation_timestamp": "2025-03-12T17:48:27.294687Z"}, {"uuid": "a4b1f6fb-3286-42c7-a710-9782cd8d41ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2592", "type": "seen", "source": "MISP/3e4b778d-5810-4171-a915-f1d106684af4", "content": "", "creation_timestamp": "2025-08-11T18:27:48.000000Z"}, {"uuid": "ef283df9-3b8d-4fd7-83fb-7cb89054cb82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2592", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/116065289827099937", "content": "", "creation_timestamp": "2026-02-13T20:49:36.915995Z"}, {"uuid": "d9ecc51c-8861-41c4-82df-50d01f2d4d0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-25925", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/7222", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25925\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A stored cross-scripting (XSS) vulnerability in Openmrs v2.4.3 Build 0ff0ed allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the personName.middleName parameter at /openmrs/admin/patients/shortPatientForm.form.\n\ud83d\udccf Published: 2025-03-11T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-11T19:27:19.617Z\n\ud83d\udd17 References:\n1. http://openmrs.com\n2. https://github.com/johnchd/CVEs/blob/main/OpenMRS/CVE-2025-25925%20-%20P-XSS.md", "creation_timestamp": "2025-03-11T20:21:08.000000Z"}, {"uuid": "67380c84-5c22-461e-87f0-3d6cc40db12e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2592", "type": "seen", "source": "https://t.me/cvedetector/20809", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2592 - \"Open Asset Import Library (Assimp) Heap-Based Buffer Overflow Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2592 \nPublished : March 21, 2025, 2:15 p.m. | 27\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp 5.4.3. This issue affects the function CSMImporter::InternReadFile of the file code/AssetLib/CSM/CSMLoader.cpp. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named 2690e354da0c681db000cfd892a55226788f2743. It is recommended to apply a patch to fix this issue. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"21 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-21T15:58:39.000000Z"}, {"uuid": "34e5dada-13e9-4308-b206-5ac5f39fa29a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2592", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8337", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2592\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp 5.4.3. This issue affects the function CSMImporter::InternReadFile of the file code/AssetLib/CSM/CSMLoader.cpp. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named 2690e354da0c681db000cfd892a55226788f2743. It is recommended to apply a patch to fix this issue.\n\ud83d\udccf Published: 2025-03-21T14:00:18.480Z\n\ud83d\udccf Modified: 2025-03-21T14:00:18.480Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300575\n2. https://vuldb.com/?ctiid.300575\n3. https://vuldb.com/?submit.517782\n4. https://github.com/assimp/assimp/issues/6010\n5. https://github.com/assimp/assimp/pull/6052\n6. https://github.com/assimp/assimp/issues/6010#issue-2877368110\n7. https://github.com/assimp/assimp/commit/2690e354da0c681db000cfd892a55226788f2743", "creation_timestamp": "2025-03-21T14:19:08.000000Z"}]}