{"vulnerability": "CVE-2025-2750", "sightings": [{"uuid": "ee224757-bf50-4c72-b0a4-7ba3d8b153dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-27509", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lk2x5bb2as27", "content": "", "creation_timestamp": "2025-03-11T01:47:46.018167Z"}, {"uuid": "2b63d1d4-e7d2-4c33-846a-3fa7d53aed61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27509", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lk74557svs2n", "content": "", "creation_timestamp": "2025-03-12T17:27:49.775157Z"}, {"uuid": "42bae0b9-e4af-437e-92ab-28d08e2dd4df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27507", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljmwkpptqd2c", "content": "", "creation_timestamp": "2025-03-05T12:00:10.712762Z"}, {"uuid": "4ac05f15-75fc-4046-9b8c-a5538d8c292d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27509", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lk34ouc5yc2v", "content": "", "creation_timestamp": "2025-03-11T03:27:08.885129Z"}, {"uuid": "cd1f2573-5cd4-43b6-970b-b570095c3031", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27500", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114100218515671455", "content": "", "creation_timestamp": "2025-03-03T19:46:07.251619Z"}, {"uuid": "2dc5e39c-2a30-445e-8457-e4b25e446393", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27501", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114100218515671455", "content": "", "creation_timestamp": "2025-03-03T19:46:07.383645Z"}, {"uuid": "5e8be484-23f2-43db-ad75-56d528457c47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27508", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ljo5nlazil2q", "content": "", "creation_timestamp": "2025-03-05T23:39:40.108224Z"}, {"uuid": "13a43d98-c4de-4d9a-9553-de75f25b1ade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27507", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114105890556873873", "content": "", "creation_timestamp": "2025-03-04T19:48:36.054331Z"}, {"uuid": "5dadaa84-9a90-4302-9aa9-bc535f7cd8ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-01)", "content": "", "creation_timestamp": "2025-12-01T00:00:00.000000Z"}, {"uuid": "02487f97-f2cc-46c5-b077-28f044fe7c11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27500", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114102115018411208", "content": "", "creation_timestamp": "2025-03-04T03:48:25.255205Z"}, {"uuid": "821a8adf-d856-4802-ae97-01d2233944d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27501", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114102115066898987", "content": "", "creation_timestamp": "2025-03-04T03:48:25.927554Z"}, {"uuid": "49ef56b0-7dfe-4285-b098-600c7336cd22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27507", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3ljlodbotcn2v", "content": "", "creation_timestamp": "2025-03-05T00:00:13.830380Z"}, {"uuid": "7f354052-007d-4e47-b598-b17aa2632ac1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27507", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lqb2a3pcyc2l", "content": "", "creation_timestamp": "2025-05-28T20:30:10.732847Z"}, {"uuid": "928fbe88-0863-4e42-8463-6c5cd83b0283", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-27505.yaml", "content": "", "creation_timestamp": "2025-07-10T20:15:34.000000Z"}, {"uuid": "809bda0c-802a-4fa1-80ba-6695399cdfc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3luqgm5djp72k", "content": "", "creation_timestamp": "2025-07-24T21:02:24.581005Z"}, {"uuid": "df512b23-e15d-46b2-85a7-58260aa88743", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27507", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-18T13:31:24.000000Z"}, {"uuid": "cd70ceeb-2bfd-4859-a9b3-5970a997a473", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "c501c711-684e-44a2-b673-136e533269fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ltxbwwatkv2p", "content": "", "creation_timestamp": "2025-07-14T21:02:22.294124Z"}, {"uuid": "ba24b063-9fca-42a5-af41-c9ca901ac747", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-28)", "content": "", "creation_timestamp": "2025-11-28T00:00:00.000000Z"}, {"uuid": "e78a89cf-6456-4ec8-8287-4a7905d756c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-20)", "content": "", "creation_timestamp": "2025-11-20T00:00:00.000000Z"}, {"uuid": "a6df644e-c4c3-44c3-b760-ccd63536dfa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-16)", "content": "", "creation_timestamp": "2025-11-16T00:00:00.000000Z"}, {"uuid": "64855908-6842-48e8-bd99-676643de113d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27507", "type": "seen", "source": "MISP/4937e86f-f5bd-4d09-8bda-88a7440077f3", "content": "", "creation_timestamp": "2025-08-19T02:47:46.000000Z"}, {"uuid": "5c5d2e42-69eb-4e33-952e-93f46fda51b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-27)", "content": "", "creation_timestamp": "2025-11-27T00:00:00.000000Z"}, {"uuid": "d6d57cf9-d245-4f92-8e21-781987883b7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-17)", "content": "", "creation_timestamp": "2025-12-17T00:00:00.000000Z"}, {"uuid": "27752b60-383a-4553-aedd-37c0a2419403", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27506", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mg6o5jlusx2v", "content": "", "creation_timestamp": "2026-03-03T21:02:56.311939Z"}, {"uuid": "ec8888ba-de75-47bd-8dc7-d97813cc7741", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-02)", "content": "", "creation_timestamp": "2025-12-02T00:00:00.000000Z"}, {"uuid": "482c1c07-93f9-4d6f-8c26-f9339aabd80e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-13)", "content": "", "creation_timestamp": "2025-12-13T00:00:00.000000Z"}, {"uuid": "f6eb15f5-a7ac-421e-9440-2e03882c4d70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-16)", "content": "", "creation_timestamp": "2025-12-16T00:00:00.000000Z"}, {"uuid": "4724e017-423d-4ed6-b384-c501a4fd8aa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-27)", "content": "", "creation_timestamp": "2026-03-27T00:00:00.000000Z"}, {"uuid": "5038d6f5-cf90-45f1-aa89-2eb378795996", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-19)", "content": "", "creation_timestamp": "2025-12-19T00:00:00.000000Z"}, {"uuid": "1b2abb7e-fd24-4367-9fa0-daf2bce2298a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-02)", "content": "", "creation_timestamp": "2026-01-02T00:00:00.000000Z"}, {"uuid": "504ba0e4-1333-438b-9797-bda74f06b4aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-18)", "content": "", "creation_timestamp": "2025-12-18T00:00:00.000000Z"}, {"uuid": "d3be833b-74f1-492a-b674-f81959220ff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27507", "type": "seen", "source": "https://t.me/cvedetector/19527", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27507 - Zitadel Insecure Direct Object Reference (IDOR) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27507 \nPublished : March 4, 2025, 5:15 p.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. ZITADEL's Admin API contains Insecure Direct Object Reference (IDOR) vulnerabilities that allow authenticated users, without specific IAM roles, to modify sensitive settings. While several endpoints are affected, the most critical vulnerability lies in the ability to manipulate LDAP configurations. Customers who do not utilize LDAP for authentication are not at risk from the most severe aspects of this vulnerability. However, upgrading to the patched version to address all identified issues is strongly recommended. This vulnerability is fixed in 2.71.0, 2.70.1, ,2.69.4, 2.68.4, 2.67.8, 2.66.11, 2.65.6, 2.64.5, and 2.63.8. \nSeverity: 9.0 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T20:01:42.000000Z"}, {"uuid": "4e71d56c-db94-4b50-b302-0185bbd484e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27500", "type": "seen", "source": "Telegram/EME7AmmlemJIAsxowp-8JDy-sBeDJ56pHelrEfJutMhJTEON", "content": "", "creation_timestamp": "2025-03-06T02:17:23.000000Z"}, {"uuid": "d4f6bdb1-3cd8-4afe-bfac-494b1daa75b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-12)", "content": "", "creation_timestamp": "2026-04-12T00:00:00.000000Z"}, {"uuid": "0d6cd4b2-d74e-49c5-ad40-4860612dae46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27501", "type": "seen", "source": "https://t.me/cvedetector/19394", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27501 - OpenZiti SSRF\", \n  \"Content\": \"CVE ID : CVE-2025-27501 \nPublished : March 3, 2025, 7:15 p.m. | 1\u00a0hour, 6\u00a0minutes ago \nDescription : OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint on the admin panel can be accessed without any form of authentication. This endpoint accepts a user-supplied URL parameter to connect to an OpenZiti Controller and performs a server-side request, resulting in a potential Server-Side Request Forgery (SSRF) vulnerability. The fixed version has moved the request to the external controller from the server side to the client side, thereby eliminating the identity of the node from being used to gain any additional permissions. This vulnerability is fixed in 3.7.1. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T21:24:32.000000Z"}, {"uuid": "971f463b-ce59-4ec8-9d66-71fd0fa60479", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27500", "type": "seen", "source": "https://t.me/cvedetector/19393", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27500 - OpenZiti Unauthenticated Stored Cross-Site Scripting (XSS) Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27500 \nPublished : March 3, 2025, 7:15 p.m. | 1\u00a0hour, 6\u00a0minutes ago \nDescription : OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint(/api/upload) on the admin panel can be accessed without any form of authentication. This endpoint accepts an HTTP POST to upload a file which is then stored on the node and is available via URL. This can lead to a stored cross site scripting attack if the file uploaded contains malicious code and is then accessed and executed within the context of the user's browser. This function is no longer necessary as the ziti-console moves from a node server application to a single page application, and has been disabled. The vulnerability is fixed in 3.7.1. \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-03T21:24:31.000000Z"}, {"uuid": "3a7b3651-c626-42f8-841a-c816b6f759f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27501", "type": "seen", "source": "Telegram/1NUNqe8iHVZcstgI4Bq16oJWlsNmjorUT_egN58ZTv-9pU5s", "content": "", "creation_timestamp": "2025-03-06T02:17:23.000000Z"}, {"uuid": "e4c6cf17-3c5a-4350-b627-f49432d51fde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27500", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6273", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27500\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N)\n\ud83d\udd39 Description: OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint(/api/upload) on the admin panel can be accessed without any form of authentication. This endpoint accepts an HTTP POST to upload a file which is then stored on the node and is available via URL. This can lead to a stored cross site scripting attack if the file uploaded contains malicious code and is then accessed and executed within the context of the user's browser. This function is no longer necessary as the ziti-console moves from a node server application to a single page application, and has been disabled. The vulnerability is fixed in 3.7.1.\n\ud83d\udccf Published: 2025-03-03T18:30:48.198Z\n\ud83d\udccf Modified: 2025-03-03T20:22:19.785Z\n\ud83d\udd17 References:\n1. https://github.com/openziti/ziti-console/security/advisories/GHSA-frxm-vm48-5qf2", "creation_timestamp": "2025-03-03T20:30:35.000000Z"}, {"uuid": "a2e2586c-69e2-4835-ab8d-b1b439c92c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27501", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6268", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27501\n\ud83d\udd25 CVSS Score: 8.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\ud83d\udd39 Description: OpenZiti is a free and open source project focused on bringing zero trust to any application. An endpoint on the admin panel can be accessed without any form of authentication. This endpoint accepts a user-supplied URL parameter to connect to an OpenZiti Controller and performs a server-side request, resulting in a potential Server-Side Request Forgery (SSRF) vulnerability. The fixed version has moved the request to the external controller from the server side to the client side, thereby eliminating the identity of the node from being used to gain any additional permissions. This vulnerability is fixed in 3.7.1.\n\ud83d\udccf Published: 2025-03-03T18:33:19.670Z\n\ud83d\udccf Modified: 2025-03-03T19:10:02.275Z\n\ud83d\udd17 References:\n1. https://github.com/openziti/ziti-console/security/advisories/GHSA-fqxh-vfv5-8qjp", "creation_timestamp": "2025-03-03T19:31:05.000000Z"}, {"uuid": "206c2311-3c39-4707-80cd-850b8605acf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27509", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/6738", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27509\n\ud83d\udd25 CVSS Score: 9.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: fleetdm/fleet is an open source device management, built on osquery. In vulnerable versions of Fleet, an attacker could craft a specially-formed SAML response to forge authentication assertions, provision a new administrative user account if Just-In-Time (JIT) provisioning is enabled, or create new accounts tied to forged assertions if f MDM enrollment is enabled. This vulnerability is fixed in 4.64.2, 4.63.2, 4.62.4, and 4.58.1.\n\ud83d\udccf Published: 2025-03-06T19:00:36.098Z\n\ud83d\udccf Modified: 2025-03-06T19:00:36.098Z\n\ud83d\udd17 References:\n1. https://github.com/fleetdm/fleet/security/advisories/GHSA-52jx-g6m5-h735\n2. https://github.com/fleetdm/fleet/commit/718c95e47ad010ad6b8ceb3f3460e921fbfc53bb", "creation_timestamp": "2025-03-06T19:38:27.000000Z"}, {"uuid": "0dc9e271-b08b-4783-af88-73de67860463", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2750", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8627", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2750\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::CSMImporter::InternReadFile of the file code/AssetLib/CSM/CSMLoader.cpp of the component CSM File Handler. The manipulation leads to out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-03-25T07:31:03.681Z\n\ud83d\udccf Modified: 2025-03-25T07:31:03.681Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.300855\n2. https://vuldb.com/?ctiid.300855\n3. https://vuldb.com/?submit.517783\n4. https://github.com/assimp/assimp/issues/6011\n5. https://github.com/assimp/assimp/issues/6011#issue-2877369004", "creation_timestamp": "2025-03-25T08:23:38.000000Z"}, {"uuid": "84d24ee6-b11d-4cf6-ac85-66daa257b5b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2750", "type": "seen", "source": "https://t.me/cvedetector/21082", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2750 - Assimp CSM File Handler Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2750 \nPublished : March 25, 2025, 8:15 a.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::CSMImporter::InternReadFile of the file code/AssetLib/CSM/CSMLoader.cpp of the component CSM File Handler. The manipulation leads to out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T11:08:11.000000Z"}, {"uuid": "c38dbca0-9300-4134-84e6-3341af1e686e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27505", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-03)", "content": "", "creation_timestamp": "2026-05-03T00:00:00.000000Z"}, {"uuid": "1065f21e-b3a5-4b0a-8cf1-a800072bf957", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27509", "type": "seen", "source": "https://t.me/cvedetector/19745", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27509 - Fleetdm Fleet SAML Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-27509 \nPublished : March 6, 2025, 7:15 p.m. | 1\u00a0hour, 9\u00a0minutes ago \nDescription : fleetdm/fleet is an open source device management, built on osquery. In vulnerable versions of Fleet, an attacker could craft a specially-formed SAML response to forge authentication assertions, provision a new administrative user account if Just-In-Time (JIT) provisioning is enabled, or create new accounts tied to forged assertions if f MDM enrollment is enabled. This vulnerability is fixed in 4.64.2, 4.63.2, 4.62.4, and 4.58.1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T22:12:34.000000Z"}, {"uuid": "53676a4d-d32f-4e73-81d3-9dcc5c25152f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27508", "type": "seen", "source": "https://t.me/cvedetector/19663", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27508 - Emissary Weak Cryptographic Hashing Algorithms\", \n  \"Content\": \"CVE ID : CVE-2025-27508 \nPublished : March 5, 2025, 10:15 p.m. | 1\u00a0hour, 22\u00a0minutes ago \nDescription : Emissary is a P2P based data-driven workflow engine. The ChecksumCalculator class within allows for hashing and checksum generation, but it includes or defaults to algorithms that are no longer recommended for secure cryptographic use cases (e.g., SHA-1, CRC32, and SSDEEP). These algorithms, while possibly valid for certain non-security-critical tasks, can expose users to security risks if used in scenarios where strong cryptographic guarantees are required. This issue is fixed in 8.24.0. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-06T01:18:19.000000Z"}, {"uuid": "4b1ee268-59d2-48ab-8247-d0a87d23e0e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2750", "type": "published-proof-of-concept", "source": "Telegram/ZQ3C3m4Ye3beVMYz2gKMjZdL4GwrlBDCQ3H5nAEOrBBrLiA", "content": "", "creation_timestamp": "2025-03-25T09:00:30.000000Z"}, {"uuid": "841cbdba-c96b-4e71-8ba7-be69f5a5e4a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27507", "type": "seen", "source": "Telegram/1O5z91QcHmrjRz26b3O2xs57dQF3nVw-sSDMEN0aU64nGRA", "content": "", "creation_timestamp": "2025-03-04T18:31:35.000000Z"}, {"uuid": "50170635-fdab-45f3-8827-63a9fc6edd96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27507", "type": "seen", "source": "https://t.me/suboxone_chatroom/7471", "content": "\ud83d\udee1CVE-2025-27507(CVSS 9.0): Zitadel Insecure Direct Object Reference (IDOR) Vulnerability\n\n\ud83d\udc7bDork:\nHUNTER : http://product.name=\"Zitadel\"\n\n\u26a0\ufe0fRefer:https://securityonline.info/cve-2025-27507-cvss-9-0-zitadel-users-at-risk-of-account-takeover/\n\n\ud83d\udda5https://github.com/zitadel/zitadel/security/advisories/GHSA-f3gh-529w-v32x\n\n#hunterhow #infosec #infosecurity #OSINT #Vulnerability", "creation_timestamp": "2025-04-01T12:38:04.000000Z"}]}