{"vulnerability": "CVE-2025-29266", "sightings": [{"uuid": "6e2957f2-57e3-4372-8420-5b7bc76e364f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29266", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lloibsw4fc22", "content": "", "creation_timestamp": "2025-03-31T13:40:18.995136Z"}, {"uuid": "07174abe-f219-4fab-95ff-46ea5522ef6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29266", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114257520635639524", "content": "", "creation_timestamp": "2025-03-31T14:30:07.168157Z"}, {"uuid": "f2440e21-33c5-49d3-858d-c81b02ae2169", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29266", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114257520635639524", "content": "", "creation_timestamp": "2025-03-31T14:30:07.169818Z"}, {"uuid": "d14a00fe-6eae-4420-b91a-0daf1faeb5df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29266", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114257829706329336", "content": "", "creation_timestamp": "2025-03-31T15:48:44.955882Z"}, {"uuid": "939360b3-23ab-45cd-9732-c841a7aed87d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29266", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114257829706329336", "content": "", "creation_timestamp": "2025-03-31T15:48:44.959448Z"}, {"uuid": "3840e0ac-cacd-4f3a-950b-fa0ace17532e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29266", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9638", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29266\n\ud83d\udd25 CVSS Score: 9.6 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Unraid 7.0.0 before 7.0.1 allows remote users to access the Unraid WebGUI and web console as root without authentication if a container is running in Host networking mode with Use Tailscale enabled.\n\ud83d\udccf Published: 2025-03-31T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-31T12:17:32.197Z\n\ud83d\udd17 References:\n1. https://github.com/unraid/webgui\n2. https://docs.unraid.net/unraid-os/release-notes/7.0.1/\n3. https://edac.dev/security/CVE-2025-29266/", "creation_timestamp": "2025-03-31T12:31:50.000000Z"}]}