{"vulnerability": "CVE-2025-26865", "sightings": [{"uuid": "9122b6c2-5e8f-4c8b-a42e-c5ad56fef6fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-26865", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lk5toqjwn22i", "content": "", "creation_timestamp": "2025-03-12T05:23:57.087802Z"}, {"uuid": "2747db47-2ffa-4012-bbd7-e10d673cb606", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lk62sukfi22t", "content": "", "creation_timestamp": "2025-03-12T07:31:33.699484Z"}, {"uuid": "0106ffff-1f55-4486-a06f-3b913f759a7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lk63teyses2k", "content": "", "creation_timestamp": "2025-03-12T07:49:46.918724Z"}, {"uuid": "def49b94-727b-4726-a4b4-2310a7e86c61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljzv7jwmfl2m", "content": "", "creation_timestamp": "2025-03-10T15:40:37.668983Z"}, {"uuid": "992f58a9-5860-4502-a98b-7f1267125fcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114138931406443712", "content": "", "creation_timestamp": "2025-03-10T15:51:18.778295Z"}, {"uuid": "806c3b49-a9da-4e57-957f-bab416a32e3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}, {"uuid": "432a31a6-f127-49f5-a253-98a5f7fc8b5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "https://t.me/cvedetector/19957", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-26865 - Apache OFBiz Template Engine Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-26865 \nPublished : March 10, 2025, 2:15 p.m. | 57\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Apache OFBiz.  \n  \nThis issue affects Apache OFBiz: from 18.12.17 before 18.12.18.\u00a0\u00a0  \n  \nIt's a regression between 18.12.17 and 18.12.18.  \nIn case you use something like that, which is not recommended!  \nFor security, only official releases should be used.  \n  \nIn other words, if you use 18.12.17 you are still safe.  \nThe version 18.12.17 is not a affected.  \nBut something between 18.12.17 and 18.12.18 is.  \n  \nIn that case, users are recommended to upgrade to version 18.12.18, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-10T16:31:54.000000Z"}, {"uuid": "c362a700-663b-4469-9849-e9081cb4b15c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7004", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-26865\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Apache OFBiz.\n\nThis issue affects Apache OFBiz: from 18.12.17 before 18.12.18.\u00a0\u00a0\n\nIt's a regression between 18.12.17 and 18.12.18.\nIn case you use something like that, which is not recommended!\nFor security, only official releases should be used.\n\nIn other words, if you use 18.12.17 you are still safe.\nThe version 18.12.17 is not a affected.\nBut something between 18.12.17 and 18.12.18 is.\n\nIn that case, users are recommended to upgrade to version 18.12.18, which fixes the issue.\n\ud83d\udccf Published: 2025-03-10T14:01:06.952Z\n\ud83d\udccf Modified: 2025-03-10T14:03:22.308Z\n\ud83d\udd17 References:\n1. https://ofbiz.apache.org/download.html\n2. https://ofbiz.apache.org/security.html\n3. https://issues.apache.org/jira/browse/OFBIZ-12594\n4. https://lists.apache.org/thread/prb48ztk01bflyyjbl6p56wlcc1n5sz7", "creation_timestamp": "2025-03-10T14:38:50.000000Z"}, {"uuid": "ebacd183-a347-4e48-86f7-e047653c4477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26865", "type": "seen", "source": "https://t.me/CyberBulletin/2600", "content": "\u26a1CVE-2025-26865: Apache OFBiz Vulnerability Could Lead to Remote Code Execution.\n\n#CyberBulletin", "creation_timestamp": "2025-03-12T14:27:51.000000Z"}, {"uuid": "00c1eb28-8cff-423c-8e4c-6851372a9b0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-26865", "type": "published-proof-of-concept", "source": "Telegram/P5LDm3S4VTfGYBgu3ytMcEur8FEGyy2Co8KdeMUu5EMrSc8", "content": "", "creation_timestamp": "2025-04-11T23:00:05.000000Z"}]}