{"vulnerability": "CVE-2025-2798", "sightings": [{"uuid": "ed9b7790-c2fc-456a-abec-d103a8456488", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2798", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10481", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2798\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Woffice CRM theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 5.4.21. This is due to a misconfiguration of excluded roles during registration. This makes it possible for unauthenticated attackers to register with an Administrator role if a custom login form is being used. This can be combined with CVE-2025-2797 to bypass the user approval process if an Administrator can be tricked into taking an action such as clicking a link.\n\ud83d\udccf Published: 2025-04-04T13:44:36.480Z\n\ud83d\udccf Modified: 2025-04-04T14:45:49.471Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/6dd6169b-bc94-4642-8975-2e96bc01576f?source=cve\n2. http://localhost/wp-content/themes/woffice/inc/classes/Woffice_Register.php#L405\n3. https://hub.woffice.io/woffice/changelog#april-1st-2025-version-5422", "creation_timestamp": "2025-04-04T15:37:10.000000Z"}, {"uuid": "34c69905-4fba-4bd1-9cd8-d86137a138bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27980", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11824", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27980\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: cashbook v4.0.3 has an arbitrary file read vulnerability in /api/entry/flow/invoice/show?invoice=.\n\ud83d\udccf Published: 2025-04-15T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-15T14:45:58.048Z\n\ud83d\udd17 References:\n1. https://blog.csdn.net/qq_52469895/article/details/145496958?sharetype=blogdetail&amp;sharerId=145496958&amp;sharerefer=PC&amp;sharesource=qq_52469895&amp;spm=1011.2480.3001.8118", "creation_timestamp": "2025-04-15T14:55:04.000000Z"}, {"uuid": "01e0d43d-229e-43c8-8100-41060cd4bd3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-27980", "type": "seen", "source": "https://t.me/cvedetector/22981", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27980 - Cashbook File Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27980 \nPublished : April 15, 2025, 3:16 p.m. | 2\u00a0hours ago \nDescription : cashbook v4.0.3 has an arbitrary file read vulnerability in /api/entry/flow/invoice/show?invoice=. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-15T19:57:25.000000Z"}, {"uuid": "ea50dc24-4bd1-4107-8382-a1e39eac6c37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2798", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3llynilidiy2p", "content": "", "creation_timestamp": "2025-04-04T14:40:12.531334Z"}, {"uuid": "24967c38-d328-41ba-87e4-07a6a0a8a53e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2798", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114280477257589770", "content": "", "creation_timestamp": "2025-04-04T15:48:17.080780Z"}, {"uuid": "314094e1-5fe5-44e9-8ef9-41f84abc714a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2798", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114280477257589770", "content": "", "creation_timestamp": "2025-04-04T15:48:17.082929Z"}, {"uuid": "8269d896-4fe1-4070-ae57-9bbc0e0cf688", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2798", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llys3nxxxw2b", "content": "", "creation_timestamp": "2025-04-04T16:02:28.640784Z"}, {"uuid": "de7cc302-76b8-4b6d-899c-ca813d543f23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2798", "type": "seen", "source": "https://t.me/cvedetector/22140", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2798 - Woffice CRM for WordPress Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2798 \nPublished : April 4, 2025, 2:15 p.m. | 1\u00a0hour, 42\u00a0minutes ago \nDescription : The Woffice CRM theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 5.4.21. This is due to a misconfiguration of excluded roles during registration. This makes it possible for unauthenticated attackers to register with an Administrator role if a custom login form is being used. This can be combined with CVE-2025-2797 to bypass the user approval process if an Administrator can be tricked into taking an action such as clicking a link. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T18:01:27.000000Z"}]}