{"vulnerability": "CVE-2025-2615", "sightings": [{"uuid": "37d88554-5461-4c00-b6e5-63720ea8996f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26157", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:44.000000Z"}, {"uuid": "d4a0feb7-1136-46c8-b9a5-6da975f894c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26153", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmxo3ko6t52q", "content": "", "creation_timestamp": "2025-04-16T22:43:21.856511Z"}, {"uuid": "bc7ff992-b144-46e1-8bb2-2cf3ab00e8f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lngln46wj424", "content": "", "creation_timestamp": "2025-04-22T21:09:32.965522Z"}, {"uuid": "8320ef67-4480-4284-96f3-6409c30db323", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26157", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114003247183040794", "content": "", "creation_timestamp": "2025-02-14T16:45:01.661484Z"}, {"uuid": "1d25fb19-d6b8-4858-8e14-c987f48e0787", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26158", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114003247198101013", "content": "", "creation_timestamp": "2025-02-14T16:45:01.847592Z"}, {"uuid": "e3d4b0e1-e2af-4df1-ad1f-09ba4ffc2226", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26156", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5peim7o42a", "content": "", "creation_timestamp": "2025-02-14T17:16:15.070069Z"}, {"uuid": "1bca291c-1d08-4513-9b0d-415e2dc37d7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26157", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5pel3htj2e", "content": "", "creation_timestamp": "2025-02-14T17:16:17.955339Z"}, {"uuid": "46c5acf0-c514-4407-badd-ada9024819bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26158", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li5penlxzf2e", "content": "", "creation_timestamp": "2025-02-14T17:16:20.289387Z"}, {"uuid": "099a7fa1-5822-4559-94ed-8d6a8daa7848", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26158", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5ud774yz2z", "content": "", "creation_timestamp": "2025-02-14T18:45:02.921326Z"}, {"uuid": "4ac3db5e-e83d-4a7d-b332-ed7763a1a537", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26156", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5ud7pi242p", "content": "", "creation_timestamp": "2025-02-14T18:45:06.021511Z"}, {"uuid": "247394aa-da5e-4567-92e7-05e54efb4879", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26157", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li5ud7zqkz2z", "content": "", "creation_timestamp": "2025-02-14T18:45:07.836746Z"}, {"uuid": "83aaafd7-6d01-466d-95d9-5db180b71fd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26156", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114004204832093791", "content": "", "creation_timestamp": "2025-02-14T20:49:07.731961Z"}, {"uuid": "0a37eb99-42e3-48df-9f6a-206ac96636c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26158", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4484", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26158\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the manage-employee.php page of Kashipara Online Attendance Management System V1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the department parameter.\n\ud83d\udccf Published: 2025-02-14T18:30:53Z\n\ud83d\udccf Modified: 2025-02-14T18:30:53Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-26158\n2. https://github.com/rtnthakur/CVE/blob/main/Kashipara/README.md", "creation_timestamp": "2025-02-14T19:17:25.000000Z"}, {"uuid": "3a07f3fc-cc15-4808-83bf-b98d30174cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/33600", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aThis script decodes, filters, and extracts cookies as part of the exploitation of CVE-2025-26159.\nURL\uff1ahttps://github.com/godBADTRY/CVE-2025-26159\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-04-22T11:31:58.000000Z"}, {"uuid": "ddad24f1-cbe1-442c-8ece-e6caa6be19c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26156", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4488", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26156\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A SQL Injection vulnerability was found in /shopping/track-orders.php in PHPGurukul Online Shopping Portal v2.1, which allows remote attackers to execute arbitrary code via orderid POST request parameter.\n\ud83d\udccf Published: 2025-02-14T18:30:53Z\n\ud83d\udccf Modified: 2025-02-14T18:30:53Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-26156\n2. https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/README.md", "creation_timestamp": "2025-02-14T19:17:54.000000Z"}, {"uuid": "7d252aed-a406-4298-93b1-9f2f7ebed5dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26157", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4487", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26157\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A SQL Injection vulnerability was found in /bpms/index.php in Source Code and Project Beauty Parlour Management System V1.1, which allows remote attackers to execute arbitrary code via the name POST request parameter.\n\ud83d\udccf Published: 2025-02-14T18:30:53Z\n\ud83d\udccf Modified: 2025-02-14T18:30:53Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2025-26157\n2. https://github.com/rtnthakur/CVE/blob/main/others/README.md", "creation_timestamp": "2025-02-14T19:17:44.000000Z"}, {"uuid": "0a5bcf5c-42d6-4ea4-b698-a75f0092ed5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26153", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12423", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26153\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A Stored XSS vulnerability exists in the message compose feature of Chamilo LMS 1.11.28. Attackers can inject malicious scripts into messages, which execute when victims, such as administrators, reply to the message.\n\ud83d\udccf Published: 2025-04-16T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-18T12:02:40.609Z\n\ud83d\udd17 References:\n1. https://github.com/chamilo/chamilo-lms/commit/beb07770d674fcc9db6df0e59aab107678c28682\n2. https://github.com/chamilo/chamilo-lms/commit/d5c29cf39ac30d7364a52bba4036c3e870412066\n3. https://gist.github.com/NoSpaceAvailable/234acdf57b5d7b29b2f39090c1686bc8", "creation_timestamp": "2025-04-18T12:58:29.000000Z"}, {"uuid": "e0f04dd0-6cde-4806-9f18-f064d0dd378c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26158", "type": "seen", "source": "https://t.me/cvedetector/18117", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26158 - Kashipara Online Attendance Management System Stored XSS\", \n  \"Content\": \"CVE ID : CVE-2025-26158 \nPublished : Feb. 14, 2025, 5:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the manage-employee.php page of Kashipara Online Attendance Management System V1.0. This vulnerability allows remote attackers to execute arbitrary scripts via the department parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T19:56:47.000000Z"}, {"uuid": "509c423a-668b-409c-8eef-6409d2d24074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12978", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26159\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Laravel Starter 11.11.0 is vulnerable to Cross Site Scripting (XSS) in the tags feature. Any user with the ability of create or modify tags can inject malicious JavaScript code in the name field.\n\ud83d\udccf Published: 2025-04-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-22T20:43:07.620Z\n\ud83d\udd17 References:\n1. https://github.com/nasirkhan/laravel-starter\n2. https://godbadtry.github.io/posts/CVE-2025-26159/", "creation_timestamp": "2025-04-22T21:04:18.000000Z"}, {"uuid": "f4af74b3-20f3-41d5-8b8c-e94a413402c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26157", "type": "seen", "source": "https://t.me/cvedetector/18116", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26157 - \"Project Beauty Parlour Management System SQL Injection\"\", \n  \"Content\": \"CVE ID : CVE-2025-26157 \nPublished : Feb. 14, 2025, 5:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : A SQL Injection vulnerability was found in /bpms/index.php in Source Code and Project Beauty Parlour Management System V1.1, which allows remote attackers to execute arbitrary code via the name POST request parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T19:56:46.000000Z"}, {"uuid": "0188c34b-a2cb-49d8-9a4c-c7892deb9f9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26156", "type": "seen", "source": "https://t.me/cvedetector/18114", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26156 - PHPGurukul Online Shopping Portal SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26156 \nPublished : Feb. 14, 2025, 5:15 p.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : A SQL Injection vulnerability was found in /shopping/track-orders.php in PHPGurukul Online Shopping Portal v2.1, which allows remote attackers to execute arbitrary code via orderid POST request parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T19:56:45.000000Z"}, {"uuid": "a8d17577-ae0c-4936-af1e-952233d7fc19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26153", "type": "seen", "source": "https://t.me/cvedetector/23176", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26153 - Chamilo LMS Stored Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-26153 \nPublished : April 16, 2025, 9:15 p.m. | 30\u00a0minutes ago \nDescription : A Stored XSS vulnerability exists in the message compose feature of Chamilo LMS 1.11.28. Attackers can inject malicious scripts into messages, which execute when victims, such as administrators, reply to the message. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T00:25:50.000000Z"}, {"uuid": "aed6fadc-b11a-458c-b31f-c94be5eb3e0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26159", "type": "seen", "source": "https://t.me/cvedetector/23561", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26159 - Laravel Starter XSS in Tag Name Field\", \n  \"Content\": \"CVE ID : CVE-2025-26159 \nPublished : April 22, 2025, 8:15 p.m. | 1\u00a0hour, 48\u00a0minutes ago \nDescription : Laravel Starter 11.11.0 is vulnerable to Cross Site Scripting (XSS) in the tags feature. Any user with the ability of create or modify tags can inject malicious JavaScript code in the name field. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-23T00:15:53.000000Z"}]}