{"vulnerability": "CVE-2025-3153", "sightings": [{"uuid": "590c35ee-4e73-4e9f-aa9c-e0c74670eae1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31531", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114265379083150582", "content": "", "creation_timestamp": "2025-04-01T23:48:39.425816Z"}, {"uuid": "e88dd599-5b05-4f32-844b-bd2ae592e730", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31531", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3llrtldhqau2o", "content": "", "creation_timestamp": "2025-04-01T21:40:28.925152Z"}, {"uuid": "fa5c6e71-638a-4ad4-8b71-e8c1375645da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31534", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3llrtleuvb722", "content": "", "creation_timestamp": "2025-04-01T21:40:30.449973Z"}, {"uuid": "f135f9ee-cf81-47db-8d59-1286748d709e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31531", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114265379083150582", "content": "", "creation_timestamp": "2025-04-01T23:48:39.423758Z"}, {"uuid": "5e41c260-d1c2-4325-850b-c9f3b6dcbb5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31534", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lls5j7iigp2r", "content": "", "creation_timestamp": "2025-04-02T00:38:14.708136Z"}, {"uuid": "1b54824d-f624-4ff5-9efb-988757abf24d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31534", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114265379121005167", "content": "", "creation_timestamp": "2025-04-01T23:48:39.722079Z"}, {"uuid": "570e369f-2f6a-4d33-9fbd-80932de64f40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31534", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114265379121005167", "content": "", "creation_timestamp": "2025-04-01T23:48:39.711630Z"}, {"uuid": "5b6f44ed-3be9-4673-947a-dd4566874578", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31534", "type": "seen", "source": "https://t.me/cvedetector/21822", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31534 - Shopperdotcom Shopper SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-31534 \nPublished : April 1, 2025, 9:15 p.m. | 27\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in shopperdotcom Shopper allows SQL Injection. This issue affects Shopper: from n/a through 3.2.5. \nSeverity: 9.3 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T23:56:22.000000Z"}, {"uuid": "0356d6de-e482-482d-952c-f0a8a1be061d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-31537", "type": "seen", "source": "https://t.me/cvedetector/21821", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31537 - Madfishdigital Bulk NoIndex &amp; NoFollow Toolkit Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-31537 \nPublished : April 1, 2025, 9:15 p.m. | 27\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in madfishdigital Bulk NoIndex &amp; NoFollow Toolkit allows Reflected XSS. This issue affects Bulk NoIndex &amp; NoFollow Toolkit: from n/a through 2.16. \nSeverity: 7.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T23:56:21.000000Z"}, {"uuid": "d86aa25c-32c5-40cb-8beb-3eaaa4dda002", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3153", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lluwbcqnqs2i", "content": "", "creation_timestamp": "2025-04-03T03:06:33.731971Z"}, {"uuid": "4a3145f4-0591-49e5-9979-c17d4dfac828", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3153", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10232", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3153\n\ud83d\udd25 CVSS Score: 5.1 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L)\n\ud83d\udd39 Description: Concrete CMS version 9 below 9.4.0RC2 and versions below 8.5.20 are vulnerable to CSRF and XSS in the Concrete CMS Address attribute because addresses are not properly sanitized in the output when a country is not specified.\u00a0 Attackers are limited to individuals whom a site administrator has granted the ability to fill in an address attribute. It is possible for the attacker to glean limited information from the site but amount and type is restricted by mitigating controls and the level of access of the attacker. Limited data modification is possible. The dashboard page itself could be rendered unavailable. \nThe fix only sanitizes new data uploaded post update to Concrete CMS 9.4.0RC2. Existing database entries added before the update will still be \u201clive\u201d if there were successful exploits added under previous versions; a database search is recommended. The Concrete CMS security team gave this vulnerability CVSS v.4.0 score of 5.1  with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L\u00a0Thanks Myq Larson for reporting.\n\ud83d\udccf Published: 2025-04-03T00:17:14.553Z\n\ud83d\udccf Modified: 2025-04-03T14:04:44.950Z\n\ud83d\udd17 References:\n1. https://github.com/concretecms/concretecms/pull/12512\n2. https://github.com/concretecms/concretecms/pull/12511\n3. https://documentation.concretecms.org/9-x/developers/introduction/version-history/940-release-notes\n4. https://github.com/concretecms/concretecms/releases/tag/8.5.20", "creation_timestamp": "2025-04-03T14:35:21.000000Z"}, {"uuid": "d923e15b-ca40-47d3-b414-d9bc125c7119", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3153", "type": "seen", "source": "https://t.me/cvedetector/21935", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3153 - Concrete CMS Address Attribute Cross-Site Request Forgery and Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3153 \nPublished : April 3, 2025, 2:15 a.m. | 25\u00a0minutes ago \nDescription : Concrete CMS version 9 below 9.4.0RC2 and versions below 8.5.20 are vulnerable to CSRF and XSS in the Concrete CMS Address attribute because addresses are not properly sanitized in the output when a country is not specified.\u00a0 Attackers are limited to individuals whom a site administrator has granted the ability to fill in an address attribute. It is possible for the attacker to glean limited information from the site but amount and type is restricted by mitigating controls and the level of access of the attacker. Limited data modification is possible. The dashboard page itself could be rendered unavailable.   \nThe fix only sanitizes new data uploaded post update to Concrete CMS 9.4.0RC2. Existing database entries added before the update will still be \u201clive\u201d if there were successful exploits added under previous versions; a database search is recommended. The Concrete CMS security team gave this vulnerability CVSS v.4.0 score of 5.1  with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L\u00a0Thanks Myq Larson for reporting. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T05:12:02.000000Z"}]}