{"vulnerability": "CVE-2025-2941", "sightings": [{"uuid": "407d33b6-a3e7-4778-b97e-7c4aa8f0b249", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29411", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkt6skzq642n", "content": "", "creation_timestamp": "2025-03-20T17:08:54.262175Z"}, {"uuid": "c6523d71-35c0-4f35-83c0-1638a4bd0e13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29410", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkt6sjzpaz24", "content": "", "creation_timestamp": "2025-03-20T17:08:49.553285Z"}, {"uuid": "af710af1-ea53-4a46-b297-9198e51d073d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2941", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10598", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2941\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Drag and Drop Multiple File Upload for WooCommerce plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation via the wc-upload-file[] parameter in all versions up to, and including, 1.1.4. This makes it possible for unauthenticated attackers to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php).\n\ud83d\udccf Published: 2025-04-05T07:01:10.502Z\n\ud83d\udccf Modified: 2025-04-05T07:01:10.502Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/2685a2b4-aba3-425b-af0d-06f7693ab3d7?source=cve\n2. https://wordpress.org/plugins/drag-and-drop-multiple-file-upload-for-woocommerce/#developers\n3. https://plugins.trac.wordpress.org/changeset?sfp_email=&amp;sfph_mail=&amp;reponame=&amp;old=3266697%40drag-and-drop-multiple-file-upload-for-woocommerce&amp;new=3266697%40drag-and-drop-multiple-file-upload-for-woocommerce&amp;sfp_email=&amp;sfph_mail=", "creation_timestamp": "2025-04-05T07:36:58.000000Z"}, {"uuid": "6539d113-bb08-4bc1-bc25-39dcd4159de7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29410", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8416", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29410\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: A cross-site scripting (XSS) vulnerability in the component /contact.php of Hospital Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the txtEmail parameter.\n\ud83d\udccf Published: 2025-03-20T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T18:57:01.623Z\n\ud83d\udd17 References:\n1. https://github.com/kishan0725/Hospital-Management-System/issues/49\n2. https://www.simonjuguna.com/cve-2025-29410-hospital-management-system-xss-vulnerability/", "creation_timestamp": "2025-03-21T19:19:48.000000Z"}, {"uuid": "13ac014f-c959-4fa8-a7b1-a7713d75a57b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29412", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkt6sle2lr26", "content": "", "creation_timestamp": "2025-03-20T17:08:56.152434Z"}, {"uuid": "4212ebbc-4ce1-4296-8026-03a9acbaabfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2941", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lm2hyuntn72u", "content": "", "creation_timestamp": "2025-04-05T08:07:15.992650Z"}, {"uuid": "65037ace-9fed-44c1-aac8-68b9bfe7016f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2941", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lm2jttvado2p", "content": "", "creation_timestamp": "2025-04-05T08:40:14.638491Z"}, {"uuid": "c7b20aa6-74b0-4b2c-b1c5-fe748b8aa6f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2941", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114284724284984483", "content": "", "creation_timestamp": "2025-04-05T09:48:21.956408Z"}, {"uuid": "cb477309-de8c-41a1-b505-a2367e5117ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2941", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114284724284984483", "content": "", "creation_timestamp": "2025-04-05T09:48:21.960470Z"}, {"uuid": "7a44e2fa-6674-415e-9cff-7f9e568c9bef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2941", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmddnqnwgc2a", "content": "", "creation_timestamp": "2025-04-08T20:43:25.407780Z"}, {"uuid": "f842c5f2-f5ba-41b3-8faf-6f5af648a7ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2941", "type": "seen", "source": "https://t.me/cvedetector/22187", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2941 - WooCommerce Drag and Drop Multiple File Upload Remote File Moving Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2941 \nPublished : April 5, 2025, 7:15 a.m. | 1\u00a0hour, 29\u00a0minutes ago \nDescription : The Drag and Drop Multiple File Upload for WooCommerce plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation via the wc-upload-file[] parameter in all versions up to, and including, 1.1.4. This makes it possible for unauthenticated attackers to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-05T11:34:35.000000Z"}, {"uuid": "86f93343-f762-4186-ab83-f635c830b966", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29410", "type": "seen", "source": "https://t.me/cvedetector/20740", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29410 - Hospital Management System XSS\", \n  \"Content\": \"CVE ID : CVE-2025-29410 \nPublished : March 20, 2025, 2:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : A cross-site scripting (XSS) vulnerability in the component /contact.php of Hospital Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the txtEmail parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T17:24:01.000000Z"}, {"uuid": "bcd97d5b-52ea-43e0-861d-6c5fd3b32f12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29411", "type": "seen", "source": "https://t.me/cvedetector/20737", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29411 - Mart Developers iBanking Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2025-29411 \nPublished : March 20, 2025, 3:15 p.m. | 54\u00a0minutes ago \nDescription : An arbitrary file upload vulnerability in the Client Profile Update section of Mart Developers iBanking v2.0.0 allows attackers to execute arbitrary code via uploading a crafted PHP file. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T17:23:59.000000Z"}, {"uuid": "ae69dea7-5854-4dfa-b071-be0492725808", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29412", "type": "seen", "source": "https://t.me/cvedetector/20741", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29412 - Mart Developers iBanking XSS\", \n  \"Content\": \"CVE ID : CVE-2025-29412 \nPublished : March 20, 2025, 2:15 p.m. | 1\u00a0hour, 54\u00a0minutes ago \nDescription : A cross-site scripting (XSS) vulnerability in the Client Profile Update section of Mart Developers iBanking v2.0.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name parameter. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-20T17:24:02.000000Z"}, {"uuid": "93955ccd-7643-4fb5-a3db-ff516716325b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2941", "type": "seen", "source": "Telegram/L5SAU4f3eGEPgmBfC4pBjvw85ssHVPoqZ4P4UBxZqncyMP4", "content": "", "creation_timestamp": "2025-04-05T09:30:23.000000Z"}]}