{"vulnerability": "CVE-2025-2786", "sightings": [{"uuid": "978033a0-501b-495c-ad59-aa9071943779", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27867", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lk735oc7vx26", "content": "", "creation_timestamp": "2025-03-12T17:10:14.211608Z"}, {"uuid": "6d3a1fa3-ff60-48a4-be5d-583f1ef94dbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27867", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8449", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27867\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Felix HTTP Webconsole Plugin.\n\nThis issue affects Apache Felix HTTP Webconsole Plugin: from Version 1.X through 1.2.0.\n\nUsers are recommended to upgrade to version 1.2.2, which fixes the issue.\n\ud83d\udccf Published: 2025-03-12T15:51:24.965Z\n\ud83d\udccf Modified: 2025-03-21T20:36:57.712Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/y83f2rvm8bccr5ctgv7mzxd69p6f77dp", "creation_timestamp": "2025-03-21T21:22:11.000000Z"}, {"uuid": "b3499a71-dc4b-45f0-9072-b0b5c37f545f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27867", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114150759111212347", "content": "", "creation_timestamp": "2025-03-12T17:59:15.220777Z"}, {"uuid": "3a8178e1-ead7-40aa-877e-c06a1898cf20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27867", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114150762205997815", "content": "", "creation_timestamp": "2025-03-12T18:00:03.122369Z"}, {"uuid": "5216dab6-8892-46e4-8de3-eef16d8f5241", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27867", "type": "seen", "source": "https://t.me/cvedetector/20150", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27867 - Apache Felix HTTP Webconsole Plugin Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-27867 \nPublished : March 12, 2025, 4:15 p.m. | 2\u00a0hours, 58\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Felix HTTP Webconsole Plugin.  \n  \nThis issue affects Apache Felix HTTP Webconsole Plugin: from Version 1.X through 1.2.0.  \n  \nUsers are recommended to upgrade to version 1.2.2, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-12T20:22:58.000000Z"}, {"uuid": "9573afe2-1228-49b4-82e9-0765fb970baa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27867", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk7cpuu6ls2x", "content": "", "creation_timestamp": "2025-03-12T19:25:43.548204Z"}, {"uuid": "699cb6bd-66f1-48dc-ba86-fd0219935c53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2786", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lltgrtolbw2x", "content": "", "creation_timestamp": "2025-04-02T12:56:48.428220Z"}, {"uuid": "6e2cdb76-dd45-43e4-9dfa-7b96a4f53174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2786", "type": "seen", "source": "https://t.me/cvedetector/21854", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2786 - Tempo Operator Information Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-2786 \nPublished : April 2, 2025, 11:15 a.m. | 1\u00a0hour, 2\u00a0minutes ago \nDescription : A flaw was found in Tempo Operator, where it creates a ServiceAccount, ClusterRole, and ClusterRoleBinding when a user deploys a TempoStack or TempoMonolithic instance. This flaw allows a user with full access to their namespace to extract the ServiceAccount token and use it to submit TokenReview and SubjectAccessReview requests, potentially revealing information about other users' permissions. While this does not allow privilege escalation or impersonation, it exposes information that could aid in gathering information for further attacks. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-02T14:58:56.000000Z"}]}