{"vulnerability": "CVE-2025-3090", "sightings": [{"uuid": "70e52cfa-f934-4246-ac64-a7028c67be3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30901", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114261603917920012", "content": "", "creation_timestamp": "2025-04-01T07:48:33.817823Z"}, {"uuid": "2e75e58d-88d1-4982-81cc-61468ec62546", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30901", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114261603917920012", "content": "", "creation_timestamp": "2025-04-01T07:48:33.806952Z"}, {"uuid": "0431af97-f131-4702-ad59-c281416cd397", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3090", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lsdrcvmz7f2i", "content": "", "creation_timestamp": "2025-06-24T09:19:05.972356Z"}, {"uuid": "2958bd82-3388-4628-8299-e0361162112b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3090", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114737343640310100", "content": "", "creation_timestamp": "2025-06-24T08:15:24.992786Z"}, {"uuid": "98675d7f-2815-4e5b-a8b8-ff8a3584e5fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3090", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19325", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3090\n\ud83d\udd25 CVSS Score: 8.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H)\n\ud83d\udd39 Description: An unauthenticated remote attacker can obtain limited sensitive information and/or DoS the device due to missing authentication for critical function.\n\ud83d\udccf Published: 2025-06-24T08:05:15.547Z\n\ud83d\udccf Modified: 2025-06-24T08:05:15.547Z\n\ud83d\udd17 References:\n1. https://certvde.com/en/advisories/VDE-2025-034\n2. https://certvde.com/en/advisories/VDE-2025-037", "creation_timestamp": "2025-06-24T08:50:41.000000Z"}, {"uuid": "b0a6c26b-05f4-4059-b2e5-db944de0d3e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3090", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3lsdns4hibhy2", "content": "", "creation_timestamp": "2025-06-24T08:16:10.215862Z"}, {"uuid": "b65b3b3c-4c31-474c-b67f-dae02c72a149", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3090", "type": "seen", "source": "https://infosec.exchange/users/certvde/statuses/114737347312829472", "content": "", "creation_timestamp": "2025-06-24T08:16:20.624978Z"}, {"uuid": "a7f8da53-633f-4e5b-8ec4-fb7168d73869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3090", "type": "seen", "source": "https://bsky.app/profile/certvde.infosec.exchange.ap.brid.gy/post/3lsdnsyez5py2", "content": "", "creation_timestamp": "2025-06-24T08:16:34.220274Z"}, {"uuid": "49b658bf-96b2-4d34-8a61-e7e504b647b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30907", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9049", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30907\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SecuPress SecuPress Free allows DOM-Based XSS. This issue affects SecuPress Free: from n/a through 2.2.5.3.\n\ud83d\udccf Published: 2025-03-27T10:55:52.341Z\n\ud83d\udccf Modified: 2025-03-27T10:55:52.341Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/secupress/vulnerability/wordpress-secupress-free-plugin-2-2-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-27T11:26:31.000000Z"}, {"uuid": "1f201519-add3-429f-8e2b-2dddf2021545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30909", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9048", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30909\n\ud83d\udd25 CVSS Score: 4.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)\n\ud83d\udd39 Description: Missing Authorization vulnerability in Conversios Conversios.io allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Conversios.io: from n/a through 7.2.3.\n\ud83d\udccf Published: 2025-03-27T10:55:53.123Z\n\ud83d\udccf Modified: 2025-03-27T10:55:53.123Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/enhanced-e-commerce-for-woocommerce-store/vulnerability/wordpress-conversios-io-plugin-7-2-3-broken-access-control-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-27T11:26:27.000000Z"}, {"uuid": "333ccb6b-5f12-4d55-a21a-4406f11b0d20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30900", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9052", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30900\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zoho Subscriptions Zoho Billing \u2013 Embed Payment Form allows Stored XSS. This issue affects Zoho Billing \u2013 Embed Payment Form: from n/a through 4.0.\n\ud83d\udccf Published: 2025-03-27T10:55:50.264Z\n\ud83d\udccf Modified: 2025-03-27T10:55:50.264Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/zoho-subscriptions/vulnerability/wordpress-zoho-billing-embed-payment-form-plugin-4-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-27T11:26:34.000000Z"}, {"uuid": "9506cbcc-8a05-411c-ba64-4e68c71b76ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30903", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9051", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30903\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alex Mills SyntaxHighlighter Evolved allows DOM-Based XSS. This issue affects SyntaxHighlighter Evolved: from n/a through 3.7.1.\n\ud83d\udccf Published: 2025-03-27T10:55:50.948Z\n\ud83d\udccf Modified: 2025-03-27T10:55:50.948Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/syntaxhighlighter/vulnerability/wordpress-syntaxhighlighter-evolved-plugin-3-7-1-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-27T11:26:32.000000Z"}, {"uuid": "a5c57cfe-1c5b-42d5-96f1-b720b3daa5fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30904", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9050", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30904\n\ud83d\udd25 CVSS Score: 5.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ays Pro Chartify allows Stored XSS. This issue affects Chartify: from n/a through 3.1.7.\n\ud83d\udccf Published: 2025-03-27T10:55:51.642Z\n\ud83d\udccf Modified: 2025-03-27T10:55:51.642Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/chart-builder/vulnerability/wordpress-chartify-plugin-3-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-03-27T11:26:32.000000Z"}, {"uuid": "63bad292-8042-4ea3-b28d-ae27b78de46c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30901", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9858", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30901\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in JoomSky JS Help Desk allows PHP Local File Inclusion. This issue affects JS Help Desk: from n/a through 2.9.2.\n\ud83d\udccf Published: 2025-04-01T05:31:40.254Z\n\ud83d\udccf Modified: 2025-04-01T05:31:40.254Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/js-support-ticket/vulnerability/wordpress-js-help-desk-plugin-2-9-2-local-file-inclusion-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-01T06:32:12.000000Z"}, {"uuid": "067fb015-b8ed-46c8-a01b-7ae9e7ea1987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30902", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9857", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30902\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ATL Software SRL AEC Kiosque allows Reflected XSS. This issue affects AEC Kiosque: from n/a through 1.9.3.\n\ud83d\udccf Published: 2025-04-01T05:31:40.449Z\n\ud83d\udccf Modified: 2025-04-01T05:31:40.449Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/aec-kiosque/vulnerability/wordpress-aec-kiosque-plugin-1-9-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-01T06:32:11.000000Z"}, {"uuid": "8b7e898e-09a4-4586-b604-772112c3b9af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30903", "type": "seen", "source": "https://t.me/cvedetector/21292", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30903 - Alex Mills SyntaxHighlighter Evolved Cross-Site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-30903 \nPublished : March 27, 2025, 11:15 a.m. | 2\u00a0hours, 14\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alex Mills SyntaxHighlighter Evolved allows DOM-Based XSS. This issue affects SyntaxHighlighter Evolved: from n/a through 3.7.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T14:58:44.000000Z"}, {"uuid": "6b606951-f01b-4ae2-8e0c-bd6b8bc97429", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30900", "type": "seen", "source": "https://t.me/cvedetector/21290", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30900 - Zoho Subscriptions Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-30900 \nPublished : March 27, 2025, 11:15 a.m. | 2\u00a0hours, 14\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Zoho Subscriptions Zoho Billing \u2013 Embed Payment Form allows Stored XSS. This issue affects Zoho Billing \u2013 Embed Payment Form: from n/a through 4.0. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T14:58:43.000000Z"}, {"uuid": "6b9944a5-3fcb-4e25-ac83-06bfea68d814", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30902", "type": "seen", "source": "https://t.me/cvedetector/21732", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30902 - ATL Software SRL AEC Kiosque Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-30902 \nPublished : April 1, 2025, 6:15 a.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ATL Software SRL AEC Kiosque allows Reflected XSS. This issue affects AEC Kiosque: from n/a through 1.9.3. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T09:26:54.000000Z"}, {"uuid": "13a0d95d-9686-4454-a172-b295eea59d76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30901", "type": "seen", "source": "https://t.me/cvedetector/21730", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-30901 - JoomSky JS Help Desk PHP Remote File Inclusion\", \n  \"Content\": \"CVE ID : CVE-2025-30901 \nPublished : April 1, 2025, 6:15 a.m. | 1\u00a0hour, 5\u00a0minutes ago \nDescription : Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in JoomSky JS Help Desk allows PHP Local File Inclusion. This issue affects JS Help Desk: from n/a through 2.9.2. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T09:26:50.000000Z"}]}