{"vulnerability": "CVE-2025-3207", "sightings": [{"uuid": "70879f43-f86a-4339-8d7d-4aece172cabf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32070", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114320523948394256", "content": "", "creation_timestamp": "2025-04-11T17:32:41.648864Z"}, {"uuid": "1ec5c108-3ce0-4fc1-a7b3-a521429abc15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3207", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llxnhfvpu32z", "content": "", "creation_timestamp": "2025-04-04T05:06:58.149855Z"}, {"uuid": "fec58a79-bfcf-4ea6-af13-5c5f02ae5862", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32071", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114320523948394256", "content": "", "creation_timestamp": "2025-04-11T17:32:41.704759Z"}, {"uuid": "672d6fdc-1c1d-4b36-b2e8-dce98e75a151", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32073", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114320523948394256", "content": "", "creation_timestamp": "2025-04-11T17:32:41.781571Z"}, {"uuid": "8e7bd9b8-06f3-494f-985b-ab9aca8e3b93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32074", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114320523948394256", "content": "", "creation_timestamp": "2025-04-11T17:32:41.845180Z"}, {"uuid": "6fb10c2d-9762-4781-84da-20b9d3ec1083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32079", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114320523948394256", "content": "", "creation_timestamp": "2025-04-11T17:32:41.924987Z"}, {"uuid": "38dde861-1c39-4096-ad80-54fe9075e92b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32071", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkroqdc3u2q", "content": "", "creation_timestamp": "2025-04-11T19:43:09.191915Z"}, {"uuid": "9880a61b-a7c6-4f8d-8a4c-8dc9264fc07a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32072", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkroqmm5p2g", "content": "", "creation_timestamp": "2025-04-11T19:43:09.850292Z"}, {"uuid": "a654e55f-7e1b-4340-9b71-1aa774e69e8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32074", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkroqztnd2v", "content": "", "creation_timestamp": "2025-04-11T19:43:12.060442Z"}, {"uuid": "924289f9-a2c1-4ace-8b3f-e2354f796b7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32078", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkror5mno2u", "content": "", "creation_timestamp": "2025-04-11T19:43:12.569728Z"}, {"uuid": "c6c387bb-9133-4c16-b85e-b30111e114c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32073", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkrorrlqp2g", "content": "", "creation_timestamp": "2025-04-11T19:43:16.037020Z"}, {"uuid": "8e439fce-267e-40a4-8b1f-e631934dc683", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32079", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkroruxqk2c", "content": "", "creation_timestamp": "2025-04-11T19:43:16.571464Z"}, {"uuid": "b948f329-c2ce-42e2-bcff-b2e0ffebc199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32070", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkroryd5g2u", "content": "", "creation_timestamp": "2025-04-11T19:43:17.090053Z"}, {"uuid": "0611d8fc-e76c-4d7d-8ab0-c73ead9299ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32075", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkros7kjh2i", "content": "", "creation_timestamp": "2025-04-11T19:43:18.229519Z"}, {"uuid": "d9d4ebd1-91ba-4856-ab0d-ca254a797e8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32076", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkrosg6fm2z", "content": "", "creation_timestamp": "2025-04-11T19:43:19.449562Z"}, {"uuid": "c4134413-8ea7-4a20-a330-2ef76ad2fd84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32077", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmkrosjlv426", "content": "", "creation_timestamp": "2025-04-11T19:43:20.093636Z"}, {"uuid": "a2bba0e1-3f51-4c43-9ae0-1b0506f09589", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32070", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11490", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32070\n\ud83d\udd25 CVSS Score: 10 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - AJAX Poll Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - AJAX Poll Extension: from 1.39 through 1.43.\n\ud83d\udccf Published: 2025-04-11T16:20:24.436Z\n\ud83d\udccf Modified: 2025-04-11T19:17:46.011Z\n\ud83d\udd17 References:\n1. https://phabricator.wikimedia.org/T389590\n2. https://gerrit.wikimedia.org/r/q/Ib59c59b2cd36928ab200149c851e2bfcf5cf920c", "creation_timestamp": "2025-04-11T19:50:41.000000Z"}, {"uuid": "a97f6e46-f908-45a7-af14-6d2f86217543", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3207", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10554", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3207\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /birthing_form.php. The manipulation of the argument birth_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-04T04:00:10.038Z\n\ud83d\udccf Modified: 2025-04-04T20:20:43.775Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303161\n2. https://vuldb.com/?ctiid.303161\n3. https://vuldb.com/?submit.545934\n4. https://github.com/2364490073/cve1/blob/main/README.md\n5. https://code-projects.org/", "creation_timestamp": "2025-04-04T20:36:27.000000Z"}, {"uuid": "8a58cbf9-8496-444d-b055-e7de10e13b47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32072", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11450", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32072\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L)\n\ud83d\udd39 Description: Improper Encoding or Escaping of Output vulnerability in The Wikimedia Foundation Mediawiki Core - Feed Utils allows WebView Injection.This issue affects Mediawiki Core - Feed Utils: from 1.39 through 1.43.\n\ud83d\udccf Published: 2025-04-11T16:23:12.186Z\n\ud83d\udccf Modified: 2025-04-11T16:40:02.558Z\n\ud83d\udd17 References:\n1. https://gerrit.wikimedia.org/r/c/mediawiki/core/+/1120134\n2. https://phabricator.wikimedia.org/T386175", "creation_timestamp": "2025-04-11T16:50:57.000000Z"}, {"uuid": "b9e682b7-8eaf-4c23-8998-f5e275fe87a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32071", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11489", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32071\n\ud83d\udd25 CVSS Score: 10 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - Wikidata Extension allows Cross-Site Scripting (XSS)\u00a0from widthheight message via ImageHandler::getDimensionsString()This issue affects Mediawiki - Wikidata Extension: from 1.39 through 1.43.\n\ud83d\udccf Published: 2025-04-11T16:19:46.163Z\n\ud83d\udccf Modified: 2025-04-11T19:28:21.215Z\n\ud83d\udd17 References:\n1. https://phabricator.wikimedia.org/T389369\n2. https://gerrit.wikimedia.org/r/q/Iac1f1c27054bfd1a4a4251281ab8c72f59204a90", "creation_timestamp": "2025-04-11T19:50:40.000000Z"}, {"uuid": "c6ef31a7-0064-43b7-87b6-50769b46cc9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32078", "type": "seen", "source": "https://t.me/cvedetector/22771", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32078 - Wikimedia Mediawiki Version Compare Extension XSS\", \n  \"Content\": \"CVE ID : CVE-2025-32078 \nPublished : April 11, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Encoding or Escaping of Output vulnerability in The Wikimedia Foundation Mediawiki - Version Compare Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Version Compare Extension: from 1.39 through 1.43. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T20:38:19.000000Z"}, {"uuid": "a24189cf-0d96-44c5-972b-bf8e282d895c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32076", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11453", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32076\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L)\n\ud83d\udd39 Description: Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - Visual Data Extension allows HTTP DoS.This issue affects Mediawiki - Visual Data Extension: from 1.39 through 1.43.\n\ud83d\udccf Published: 2025-04-11T16:23:36.096Z\n\ud83d\udccf Modified: 2025-04-11T16:39:21.649Z\n\ud83d\udd17 References:\n1. https://gerrit.wikimedia.org/r/c/mediawiki/extensions/VisualData/+/1121732\n2. https://phabricator.wikimedia.org/T385935", "creation_timestamp": "2025-04-11T16:51:00.000000Z"}, {"uuid": "401798a2-3ffa-42c3-bab4-ddeaef5728cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32079", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11459", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32079\n\ud83d\udd25 CVSS Score: 10 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)\n\ud83d\udd39 Description: Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - GrowthExperiments allows HTTP DoS.This issue affects Mediawiki - GrowthExperiments: from 1.39 through 1.43.\n\ud83d\udccf Published: 2025-04-11T16:24:21.988Z\n\ud83d\udccf Modified: 2025-04-11T16:36:05.647Z\n\ud83d\udd17 References:\n1. https://gerrit.wikimedia.org/r/c/mediawiki/extensions/GrowthExperiments/+/1114020\n2. https://phabricator.wikimedia.org/T384244", "creation_timestamp": "2025-04-11T16:51:09.000000Z"}, {"uuid": "128e6662-33b2-41ea-afe4-bedd6b5dac06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32077", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11464", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32077\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:N)\n\ud83d\udd39 Description: Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - Extension:SimpleCalendar allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Extension:SimpleCalendar: from 1.39 through 1.43.\n\ud83d\udccf Published: 2025-04-11T16:25:06.597Z\n\ud83d\udccf Modified: 2025-04-11T16:33:20.827Z\n\ud83d\udd17 References:\n1. https://phabricator.wikimedia.org/T383472\n2. https://gerrit.wikimedia.org/r/q/Ic5b5ce8f7791026eff1aafffb32a68f3aab119be", "creation_timestamp": "2025-04-11T16:51:17.000000Z"}, {"uuid": "a12acd52-bd38-480f-a2dc-59d5bae00438", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32078", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11462", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32078\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L)\n\ud83d\udd39 Description: Improper Encoding or Escaping of Output vulnerability in The Wikimedia Foundation Mediawiki - Version Compare Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Version Compare Extension: from 1.39 through 1.43.\n\ud83d\udccf Published: 2025-04-11T16:24:46.164Z\n\ud83d\udccf Modified: 2025-04-11T16:34:20.203Z\n\ud83d\udd17 References:\n1. https://phabricator.wikimedia.org/T384269\n2. https://gerrit.wikimedia.org/r/q/If901b3b98e615e1a4f4034d932d2d592000b51d0", "creation_timestamp": "2025-04-11T16:51:12.000000Z"}, {"uuid": "a81d31ea-d81f-4956-8c02-dc2c573da692", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3207", "type": "seen", "source": "https://t.me/cvedetector/22082", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3207 - Code-projects Patient Record Management System SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3207 \nPublished : April 4, 2025, 4:15 a.m. | 1\u00a0hour, 31\u00a0minutes ago \nDescription : A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /birthing_form.php. The manipulation of the argument birth_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T07:58:51.000000Z"}, {"uuid": "b6b84fb3-2f55-4903-93f7-ac6c46434c7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32073", "type": "seen", "source": "https://t.me/cvedetector/22777", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32073 - Wikimedia Mediawiki HTML Tags Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-32073 \nPublished : April 11, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - HTML Tags allows Cross-Site Scripting (XSS).This issue affects Mediawiki - HTML Tags: from 1.39 through 1.43. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T20:38:26.000000Z"}, {"uuid": "b97bf726-ed1d-4186-9ed4-bbed1f1679b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32072", "type": "seen", "source": "https://t.me/cvedetector/22776", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32072 - Wikimedia Mediawiki Core Feed Utils XML External Entity (XXE) Injection\", \n  \"Content\": \"CVE ID : CVE-2025-32072 \nPublished : April 11, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Encoding or Escaping of Output vulnerability in The Wikimedia Foundation Mediawiki Core - Feed Utils allows WebView Injection.This issue affects Mediawiki Core - Feed Utils: from 1.39 through 1.43. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T20:38:26.000000Z"}, {"uuid": "a7c9146b-6aa3-480d-9fe7-6299bb51c450", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32071", "type": "seen", "source": "https://t.me/cvedetector/22775", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32071 - Wikimedia Mediawiki Wikidata Extension Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2025-32071 \nPublished : April 11, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - Wikidata Extension allows Cross-Site Scripting (XSS)\u00a0from widthheight message via ImageHandler::getDimensionsString()This issue affects Mediawiki - Wikidata Extension: from 1.39 through 1.43. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T20:38:25.000000Z"}, {"uuid": "1dc2c01f-de87-4413-97f9-a6510e762b7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32070", "type": "seen", "source": "https://t.me/cvedetector/22774", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32070 - Wikimedia Mediawiki AJAX Poll Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32070 \nPublished : April 11, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - AJAX Poll Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - AJAX Poll Extension: from 1.39 through 1.43. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T20:38:21.000000Z"}, {"uuid": "2933b369-ff27-45c8-a58f-0fc382a65739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32079", "type": "seen", "source": "https://t.me/cvedetector/22772", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32079 - Wikimedia Mediawiki GrowthExperiments HTTP Denial of Service (DoS)\", \n  \"Content\": \"CVE ID : CVE-2025-32079 \nPublished : April 11, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - GrowthExperiments allows HTTP DoS.This issue affects Mediawiki - GrowthExperiments: from 1.39 through 1.43. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T20:38:20.000000Z"}, {"uuid": "7ff90114-e4a9-4d4c-9a4a-a471f2870abe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32077", "type": "seen", "source": "https://t.me/cvedetector/22770", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32077 - WikiMedia SimpleCalendar XSS\", \n  \"Content\": \"CVE ID : CVE-2025-32077 \nPublished : April 11, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - Extension:SimpleCalendar allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Extension:SimpleCalendar: from 1.39 through 1.43. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T20:38:18.000000Z"}, {"uuid": "6dd420ac-4029-443c-9153-d2ff08246f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32076", "type": "seen", "source": "https://t.me/cvedetector/22769", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32076 - Wikimedia Mediawiki Visual Data Extension HTTP DoS Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32076 \nPublished : April 11, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - Visual Data Extension allows HTTP DoS.This issue affects Mediawiki - Visual Data Extension: from 1.39 through 1.43. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T20:38:14.000000Z"}, {"uuid": "58d89de2-52ab-4300-b704-2ae9e6f0290c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32075", "type": "seen", "source": "https://t.me/cvedetector/22768", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32075 - WikiMedia Foundation Mediawiki Tabs Extension Code Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32075 \nPublished : April 11, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Input Validation vulnerability in The Wikimedia Foundation Mediawiki - Tabs Extension allows Code Injection.This issue affects Mediawiki - Tabs Extension: from 1.39 through 1.43. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T20:38:14.000000Z"}, {"uuid": "981127a6-776b-4f6f-adfa-d78c297638f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32074", "type": "seen", "source": "https://t.me/cvedetector/22767", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32074 - Wikimedia Mediawiki Confirm Account Extension XSS\", \n  \"Content\": \"CVE ID : CVE-2025-32074 \nPublished : April 11, 2025, 5:15 p.m. | 40\u00a0minutes ago \nDescription : Improper Encoding or Escaping of Output vulnerability in The Wikimedia Foundation Mediawiki - Confirm Account Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Confirm Account Extension: from 1.39 through 1.43. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T20:38:13.000000Z"}]}