{"vulnerability": "CVE-2025-30091", "sightings": [{"uuid": "0c498bd6-d9f1-46bb-9205-be5eacb1a55e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30091", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ll7qmwga5e2w", "content": "", "creation_timestamp": "2025-03-25T16:59:45.630997Z"}, {"uuid": "769920b9-fa37-4d02-8bf9-55558a7b4aaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30091", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3ll7itrokhg2o", "content": "", "creation_timestamp": "2025-03-25T14:40:25.453435Z"}, {"uuid": "de5c308f-655c-496b-9fb6-d262c3253d5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30091", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-08-10T18:27:45.000000Z"}, {"uuid": "3c6081cf-74a4-4f45-8411-383793eb98c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30091", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llbek47nv22m", "content": "", "creation_timestamp": "2025-03-26T08:28:50.437650Z"}, {"uuid": "b55b0fa1-5456-46dd-bf81-97b7708d725b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30091", "type": "seen", "source": "MISP/f2f93f16-9318-44b1-9be3-2d3346ca540c", "content": "", "creation_timestamp": "2025-09-10T07:48:01.000000Z"}, {"uuid": "45a843ce-d587-47cf-bacc-2673cc02d3d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30091", "type": "seen", "source": "Telegram/fkOkNKNAko3WqC0p1YC_Gx1teUW4Z2azOsTEPi7YkRkOXCo", "content": "", "creation_timestamp": "2025-03-25T15:30:24.000000Z"}, {"uuid": "cc9a5a3c-4006-46a8-aa8d-a59fdf907bfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30091", "type": "seen", "source": "https://t.me/cvedetector/21108", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30091 - MoxieManager Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30091 \nPublished : March 25, 2025, 2:15 p.m. | 1\u00a0hour, 46\u00a0minutes ago \nDescription : In Tiny MoxieManager PHP before 4.0.0, remote code execution can occur in the installer command. This vulnerability allows unauthenticated attackers to inject and execute arbitrary code. Attacker-controlled data to InstallCommand can be inserted into config.php, and InstallCommand is available after an installation has completed. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-25T17:49:16.000000Z"}, {"uuid": "f22d7be8-a538-4468-99f8-9d12aa657feb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30091", "type": "seen", "source": "https://t.me/CyberBulletin/2818", "content": "\u26a1CVE-2025-30091: Critical RCE Flaw Found in MoxieManager.\n\n#CyberBulletin", "creation_timestamp": "2025-03-26T17:55:10.000000Z"}]}