{"vulnerability": "CVE-2025-3105", "sightings": [{"uuid": "bb4638a8-5481-4549-835a-b1a5af056490", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3105", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lly35vpghf2u", "content": "", "creation_timestamp": "2025-04-04T09:12:06.956086Z"}, {"uuid": "1cd539cb-3d93-4ac3-b415-0c03006770b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3105", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114279062340223456", "content": "", "creation_timestamp": "2025-04-04T09:48:28.714448Z"}, {"uuid": "e35e212b-bc7d-45c7-a8e8-7ecb36541fe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3105", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114279062340223456", "content": "", "creation_timestamp": "2025-04-04T09:48:28.735811Z"}, {"uuid": "fa6b8ab7-1421-4cb2-91c0-6b823fc111f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31054", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mbcrghqya52e", "content": "", "creation_timestamp": "2025-12-31T21:06:17.662510Z"}, {"uuid": "f672c143-f8b8-4d7e-a5f7-ea8f4a157462", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31056", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17389", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-31056\n\ud83d\udd25 CVSS Score: 9.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Techspawn WhatsCart - Whatsapp Abandoned Cart Recovery, Order Notifications, Chat Box, OTP for WooCommerce allows SQL Injection. This issue affects WhatsCart - Whatsapp Abandoned Cart Recovery, Order Notifications, Chat Box, OTP for WooCommerce: from n/a through 1.1.0.\n\ud83d\udccf Published: 2025-05-23T12:44:09.140Z\n\ud83d\udccf Modified: 2025-05-23T13:20:50.980Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/whatscart-for-woocommerce/vulnerability/wordpress-whatscart-plugin-1-1-0-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-23T14:06:40.000000Z"}, {"uuid": "0d119fbf-6001-4451-abe3-7031934871ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31051", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mbsjevwrkv2q", "content": "", "creation_timestamp": "2026-01-07T03:24:51.342240Z"}, {"uuid": "3316851e-e1eb-4b3c-92a6-be2a70580ab8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31051", "type": "seen", "source": "https://gist.github.com/Darkcrai86/df7b6e5f731da37f69125c5f18f6069b", "content": "", "creation_timestamp": "2026-01-07T08:31:29.000000Z"}, {"uuid": "a0a0599b-bb06-46c3-b94c-649a799965e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3105", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10411", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3105\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The Vehica Core plugin for WordPress, used by the Vehica - Car Dealer &amp; Listing WordPress Theme, is vulnerable to privilege escalation in all versions up to, and including, 1.0.97. This is due to the plugin not properly validating user meta fields prior to updating them in the database. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change escalate their privileges to Administrator.\n\ud83d\udccf Published: 2025-04-04T07:27:41.997Z\n\ud83d\udccf Modified: 2025-04-04T07:27:41.997Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/0b787d6f-d002-4f09-8336-ebb91321e20b?source=cve\n2. https://support.vehica.com/support/solutions/articles/101000393710", "creation_timestamp": "2025-04-04T07:36:04.000000Z"}, {"uuid": "58f89b9b-3fbe-46f9-98ad-cbe672f9587d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3105", "type": "seen", "source": "https://t.me/cvedetector/22105", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3105 - Vehica Core WordPress Plugin Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3105 \nPublished : April 4, 2025, 8:15 a.m. | 1\u00a0hour, 40\u00a0minutes ago \nDescription : The Vehica Core plugin for WordPress, used by the Vehica - Car Dealer &amp; Listing WordPress Theme, is vulnerable to privilege escalation in all versions up to, and including, 1.0.97. This is due to the plugin not properly validating user meta fields prior to updating them in the database. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change escalate their privileges to Administrator. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T12:09:53.000000Z"}]}