{"vulnerability": "CVE-2025-3268", "sightings": [{"uuid": "4d517407-3d1a-4ee6-9e93-93158ace6b70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3268", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3llzqj732iy2w", "content": "", "creation_timestamp": "2025-04-05T01:06:53.940264Z"}, {"uuid": "c90ede99-fbd4-41b9-9d38-86b34c8b5c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32687", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114313038180765217", "content": "", "creation_timestamp": "2025-04-10T09:49:02.350959Z"}, {"uuid": "316223d2-a520-4abd-bf51-a40162529d68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32687", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmhfsn2mmf2g", "content": "", "creation_timestamp": "2025-04-10T11:32:41.276007Z"}, {"uuid": "6eff416f-a644-458a-a9f8-caf010e4ff71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32684", "type": "seen", "source": "https://t.me/cvedetector/22581", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32684 - RomanCode MapSVG Lite Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32684 \nPublished : April 9, 2025, 5:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : Missing Authorization vulnerability in RomanCode MapSVG Lite allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MapSVG Lite: from n/a through 8.5.32. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T20:57:29.000000Z"}, {"uuid": "cac607c4-d1de-45bc-9647-1cd42be4401c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32682", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114354325188620003", "content": "", "creation_timestamp": "2025-04-17T16:48:47.911978Z"}, {"uuid": "d7c5f336-f4f8-4b21-9991-4ce8c6b12b45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32686", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114354325231602729", "content": "", "creation_timestamp": "2025-04-17T16:48:48.455279Z"}, {"uuid": "c25119a8-d292-4b78-a217-b2b453762803", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32682", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmzq3cbjxi2l", "content": "", "creation_timestamp": "2025-04-17T18:24:19.971031Z"}, {"uuid": "3b7522d1-62c5-4d31-96f4-b3184dc94b78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32686", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmzq3dk4cd2u", "content": "", "creation_timestamp": "2025-04-17T18:24:26.654498Z"}, {"uuid": "72f91861-9db3-41db-bea6-b13bfba91645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32681", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmjwksfixy2g", "content": "", "creation_timestamp": "2025-04-11T11:37:49.862550Z"}, {"uuid": "16395855-cd49-4967-9a81-a4dd26c6063c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32681", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114319171559062669", "content": "", "creation_timestamp": "2025-04-11T11:48:45.485924Z"}, {"uuid": "f97a7ae9-0f4c-4518-939e-422d28af420e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32682", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvjlbxcwcs2a", "content": "", "creation_timestamp": "2025-08-03T21:02:57.733869Z"}, {"uuid": "94d677bc-17b0-4655-84bb-30f7a2a44277", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3268", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10565", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3268\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability has been found in qinguoyi TinyWebServer up to 1.0 and classified as critical. This vulnerability affects unknown code of the file http/http_conn.cpp. The manipulation of the argument m_url_real leads to improper authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-04T21:00:14.220Z\n\ud83d\udccf Modified: 2025-04-04T21:00:14.220Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303340\n2. https://vuldb.com/?ctiid.303340\n3. https://vuldb.com/?submit.549229\n4. https://magnificent-dill-351.notion.site/Improper-Authentication-in-TinyWebServer-1-0-1c9c693918ed80cfa0f5db1a1d03c5e7", "creation_timestamp": "2025-04-04T21:36:17.000000Z"}, {"uuid": "0c3b5071-2030-428d-b9b6-0c4fbf2b46e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32681", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/11389", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32681\n\ud83d\udd25 CVSS Score: 8.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Guru Error Log Viewer allows Blind SQL Injection. This issue affects Error Log Viewer: from n/a through 1.0.5.\n\ud83d\udccf Published: 2025-04-11T08:43:03.157Z\n\ud83d\udccf Modified: 2025-04-11T08:43:03.157Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/error-log-viewer-wp/vulnerability/wordpress-error-log-viewer-by-wp-guru-plugin-1-0-5-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-04-11T08:50:13.000000Z"}, {"uuid": "13dc4756-e924-44fb-b284-48bdbcd849a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32685", "type": "seen", "source": "https://t.me/cvedetector/22579", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32685 - Aristo Rinjuang WP Inquiries SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32685 \nPublished : April 9, 2025, 5:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aristo Rinjuang WP Inquiries allows SQL Injection. This issue affects WP Inquiries: from n/a through 0.2.1. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T20:57:24.000000Z"}, {"uuid": "cf4ed01a-0100-4bbb-828e-c0cdcd50f5d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32683", "type": "seen", "source": "https://t.me/cvedetector/22578", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32683 - RomanCode MapSVG Lite Cross-site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32683 \nPublished : April 9, 2025, 5:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RomanCode MapSVG Lite allows DOM-Based XSS. This issue affects MapSVG Lite: from n/a through 8.5.32. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T20:57:23.000000Z"}, {"uuid": "156be5e2-78f8-4424-affe-89931caee248", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32680", "type": "seen", "source": "https://t.me/cvedetector/22577", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32680 - Grade Us, Inc. Review Stream Stored Cross-site Scripting\", \n  \"Content\": \"CVE ID : CVE-2025-32680 \nPublished : April 9, 2025, 5:15 p.m. | 1\u00a0hour, 19\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Grade Us, Inc. Review Stream allows Stored XSS. This issue affects Review Stream: from n/a through 1.6.7. \nSeverity: 5.9 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-09T20:57:23.000000Z"}, {"uuid": "44fe1d27-6e54-43c7-a1e3-a4cb96dfe1f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32687", "type": "seen", "source": "https://t.me/cvedetector/22626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32687 - Magnigenie Review Stars Count For WooCommerce SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-32687 \nPublished : April 10, 2025, 8:15 a.m. | 48\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Magnigenie Review Stars Count For WooCommerce allows SQL Injection. This issue affects Review Stars Count For WooCommerce: from n/a through 2.0. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-10T11:10:33.000000Z"}, {"uuid": "ec8d5f73-439c-4b96-8175-ee037c1c0c4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32681", "type": "seen", "source": "https://t.me/cvedetector/22733", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32681 - WordPress Guru SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-32681 \nPublished : April 11, 2025, 9:15 a.m. | 2\u00a0hours, 18\u00a0minutes ago \nDescription : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Guru Error Log Viewer allows Blind SQL Injection. This issue affects Error Log Viewer: from n/a through 1.0.5. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T13:56:41.000000Z"}, {"uuid": "65e6de76-cc12-4e8c-9fe9-6de2fc74b481", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3268", "type": "seen", "source": "https://t.me/cvedetector/22170", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3268 - TinyWebServer qinguoyi Remote Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-3268 \nPublished : April 4, 2025, 9:15 p.m. | 52\u00a0minutes ago \nDescription : A vulnerability has been found in qinguoyi TinyWebServer up to 1.0 and classified as critical. This vulnerability affects unknown code of the file http/http_conn.cpp. The manipulation of the argument m_url_real leads to improper authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-05T00:42:48.000000Z"}, {"uuid": "75ed6931-3a67-4de7-9bb3-800052b4fa54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32682", "type": "published-proof-of-concept", "source": "Telegram/025r9Ac4mA6AzmYH4V_5jxzygPRuLIkjd6NMrYR-gf6fiv4", "content": "", "creation_timestamp": "2025-04-18T17:00:10.000000Z"}]}