{"vulnerability": "CVE-2025-3086", "sightings": [{"uuid": "47c12d3b-3678-4599-b785-1a5f77ef52ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3086", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lly35tma2v2u", "content": "", "creation_timestamp": "2025-04-04T09:12:06.308073Z"}, {"uuid": "4f4de047-df24-4f59-9d87-d323e8355387", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30867", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9075", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30867\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SearchIQ SearchIQ allows Stored XSS. This issue affects SearchIQ: from n/a through 4.7.\n\ud83d\udccf Published: 2025-03-27T10:55:35.342Z\n\ud83d\udccf Modified: 2025-03-27T13:18:22.238Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/searchiq/vulnerability/wordpress-searchiq-plugin-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-27T13:26:56.000000Z"}, {"uuid": "a715548b-6157-45aa-a154-55d5b796a8ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30868", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9076", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30868\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in DynamicWebLab Team Manager allows PHP Local File Inclusion. This issue affects Team Manager: from n/a through 2.1.23.\n\ud83d\udccf Published: 2025-03-27T10:55:35.965Z\n\ud83d\udccf Modified: 2025-03-27T13:15:53.442Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/wp-team-manager/vulnerability/wordpress-team-manager-plugin-2-1-23-local-file-inclusion-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-27T13:26:57.000000Z"}, {"uuid": "b017c2d2-b505-49dc-988e-05c8d6e35c65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30865", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9068", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30865\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Cross-Site Request Forgery (CSRF) vulnerability in fuzzoid 3DPrint Lite allows Cross Site Request Forgery. This issue affects 3DPrint Lite: from n/a through 2.1.3.5.\n\ud83d\udccf Published: 2025-03-27T10:55:34.072Z\n\ud83d\udccf Modified: 2025-03-27T13:22:28.102Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/3dprint-lite/vulnerability/wordpress-3dprint-lite-plugin-2-1-3-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-27T13:26:44.000000Z"}, {"uuid": "8cf29a92-e1e7-4a27-b886-8105272e0175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30866", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9074", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30866\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Missing Authorization vulnerability in Giannis Kipouros Terms &amp; Conditions Per Product allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Terms &amp; Conditions Per Product: from n/a through 1.2.15.\n\ud83d\udccf Published: 2025-03-27T10:55:34.711Z\n\ud83d\udccf Modified: 2025-03-27T13:18:51.895Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/terms-and-conditions-per-product/vulnerability/wordpress-terms-conditions-per-product-plugin-1-2-15-broken-access-control-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-27T13:26:55.000000Z"}, {"uuid": "3f91d841-88f2-44f8-9a28-b8bbf1848832", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3086", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10417", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3086\n\ud83d\udd25 CVSS Score: 6.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L)\n\ud83d\udd39 Description: Improper isolation of users in M-Files Server version before 25.3.14549 allows anonymous user to affect other anonymous users views and possibly cause a denial of service\n\ud83d\udccf Published: 2025-04-04T06:37:42.901Z\n\ud83d\udccf Modified: 2025-04-04T06:37:42.901Z\n\ud83d\udd17 References:\n1. https://product.m-files.com/security-advisories/cve-2025-3086/", "creation_timestamp": "2025-04-04T07:36:12.000000Z"}, {"uuid": "bb997421-54c2-4d31-89a2-2b3c92c72ade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3086", "type": "seen", "source": "https://t.me/cvedetector/22088", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3086 - M-Files Server Anonymous User Isolation Bypass Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2025-3086 \nPublished : April 4, 2025, 7:15 a.m. | 39\u00a0minutes ago \nDescription : Improper isolation of users in M-Files Server version before 25.3.14549 allows anonymous user to affect other anonymous users views and possibly cause a denial of service \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T10:29:22.000000Z"}, {"uuid": "65189c51-f630-4880-ad35-6d26df065d2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30869", "type": "seen", "source": "https://t.me/cvedetector/21736", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30869 - Parakoos Image Wall Cross-site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-30869 \nPublished : April 1, 2025, 6:15 a.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Parakoos Image Wall allows Reflected XSS. This issue affects Image Wall: from n/a through 3.0. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T09:26:58.000000Z"}]}