{"vulnerability": "CVE-2025-3431", "sightings": [{"uuid": "c2bf5261-c1e9-48d9-b9cd-e47db124f7d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3431", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmc5ecwfn22b", "content": "", "creation_timestamp": "2025-04-08T09:18:09.379432Z"}, {"uuid": "3508571d-a2a3-4b0a-83ff-2b0dcf9f0703", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34315", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4bhg4jk6z2d", "content": "", "creation_timestamp": "2025-10-28T17:28:30.541827Z"}, {"uuid": "813061a0-91bd-4192-83a2-08b4ef3e8907", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34311", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115452557190111700", "content": "", "creation_timestamp": "2025-10-28T15:43:38.361128Z"}, {"uuid": "69b364ea-9628-4749-877c-6b7df7565d5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34313", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115452557190111700", "content": "", "creation_timestamp": "2025-10-28T15:43:38.517085Z"}, {"uuid": "ca4dd902-3698-4741-ab4c-cd3bde382b7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34315", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115452557190111700", "content": "", "creation_timestamp": "2025-10-28T15:43:38.678798Z"}, {"uuid": "27c203f0-9bdc-4633-8fe2-35c15ff3bdff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34317", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115452557190111700", "content": "", "creation_timestamp": "2025-10-28T15:43:38.893913Z"}, {"uuid": "efd794c5-7edb-4fc2-a6ad-68e85083bada", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34311", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4bboollhu2o", "content": "", "creation_timestamp": "2025-10-28T15:45:55.707376Z"}, {"uuid": "fa011afe-2d25-4042-8d80-adab4bdbce7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-34319", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/115660138571060002", "content": "", "creation_timestamp": "2025-12-04T07:34:19.680293Z"}, {"uuid": "cf6263d7-6e0b-4eab-aced-1e0afae97aec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34312", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4bcalgbpn2n", "content": "", "creation_timestamp": "2025-10-28T15:55:56.167295Z"}, {"uuid": "5ebe0e8f-3962-4ebc-96fb-d8161530ec4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34314", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4bjk3s7p623", "content": "", "creation_timestamp": "2025-10-28T18:06:31.689215Z"}, {"uuid": "67845102-2f9e-45dd-a855-87b9bc49a780", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34316", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4bjt27js624", "content": "", "creation_timestamp": "2025-10-28T18:11:32.132677Z"}, {"uuid": "2aa77975-e146-47bc-90fa-091d24faeeb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34310", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115452557190111700", "content": "", "creation_timestamp": "2025-10-28T15:43:38.289884Z"}, {"uuid": "4701d1b0-c649-48c4-a4b7-b1a1ec9c32d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34312", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115452557190111700", "content": "", "creation_timestamp": "2025-10-28T15:43:38.446106Z"}, {"uuid": "fef36e73-5716-45a3-899d-594148a54484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34314", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115452557190111700", "content": "", "creation_timestamp": "2025-10-28T15:43:38.605895Z"}, {"uuid": "f699edc4-0efd-44d7-9662-bf9922ec8c16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34316", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115452557190111700", "content": "", "creation_timestamp": "2025-10-28T15:43:38.796788Z"}, {"uuid": "f0ecb33b-13c4-4ea2-8e44-ea775a54ef5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34318", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115452557190111700", "content": "", "creation_timestamp": "2025-10-28T15:43:39.004045Z"}, {"uuid": "335b4c5c-8e0c-4a9e-b5b7-913655e74d01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34318", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4bicjj7rd27", "content": "", "creation_timestamp": "2025-10-28T17:44:23.635922Z"}, {"uuid": "5e6c15d9-e07b-437d-8c24-26d8c302ee6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34317", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m4bihfuwyl2n", "content": "", "creation_timestamp": "2025-10-28T17:47:07.469250Z"}, {"uuid": "8bdf31d8-2c03-4b7d-b336-05e2842e7fbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-34319", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m75hhpjifh26", "content": "", "creation_timestamp": "2025-12-04T07:34:20.439816Z"}, {"uuid": "a5bcb73c-042e-4958-bdfb-4290b89e1490", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-34319", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m74fsjjezt2j", "content": "", "creation_timestamp": "2025-12-03T21:31:55.425462Z"}, {"uuid": "ae32616c-379f-4b02-8607-ec75a9932186", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3431", "type": "seen", "source": "https://t.me/cvedetector/22416", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3431 - ZoomSounds WordPress Wave Audio Player with Playlist Arbitrary File Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3431 \nPublished : April 8, 2025, 8:15 a.m. | 1\u00a0hour, 7\u00a0minutes ago \nDescription : The ZoomSounds - WordPress Wave Audio Player with Playlist plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 6.91 via the 'dzsap_download' action. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T11:29:00.000000Z"}, {"uuid": "8ea95961-3a93-4966-aa50-f01b01f78e49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3431", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10856", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3431\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: The ZoomSounds - WordPress Wave Audio Player with Playlist plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 6.91 via the 'dzsap_download' action. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.\n\ud83d\udccf Published: 2025-04-08T07:29:43.985Z\n\ud83d\udccf Modified: 2025-04-08T07:29:43.985Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/a78998da-1cb1-4991-95a8-a551bde04064?source=cve\n2. https://codecanyon.net/item/zoomsounds-wordpress-wave-audio-player-with-playlist/6181433", "creation_timestamp": "2025-04-08T07:46:13.000000Z"}]}