{"vulnerability": "CVE-2025-30353", "sightings": [{"uuid": "fd350279-c666-411c-8e42-0d3c8df46192", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30353", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3llfssjrsbb2m", "content": "", "creation_timestamp": "2025-03-28T02:54:40.006008Z"}, {"uuid": "ac7199da-a255-435e-bb05-9154bfcc684a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30353", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llggszm5nc2e", "content": "", "creation_timestamp": "2025-03-28T08:52:53.873082Z"}, {"uuid": "2258b2e6-9d82-4bef-8c1b-1d4f7800a62e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30353", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lmv4v2tn6s2y", "content": "", "creation_timestamp": "2025-04-15T22:30:15.714385Z"}, {"uuid": "84c1528c-e69b-488c-af0d-c6b942cace1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30353", "type": "seen", "source": "https://t.me/cvedetector/21203", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30353 - Directus Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-30353 \nPublished : March 26, 2025, 6:15 p.m. | 31\u00a0minutes ago \nDescription : Directus is a real-time API and App dashboard for managing SQL database content. Starting in version 9.12.0 and prior to version 11.5.0, when a Flow with the \"Webhook\" trigger and the \"Data of Last Operation\" response body encounters a ValidationError thrown by a failed condition operation, the API response includes sensitive data. This includes environmental variables, sensitive API keys, user accountability information, and operational data. This issue poses a significant security risk, as any unintended exposure of this data could lead to potential misuse. Version 11.5.0 fixes the issue. \nSeverity: 8.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T20:34:49.000000Z"}]}