{"vulnerability": "CVE-2025-43007", "sightings": [{"uuid": "e1524d49-3b90-4667-ae6c-b860632be53e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43007", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lozjab7vyz2p", "content": "", "creation_timestamp": "2025-05-13T03:12:14.303840Z"}, {"uuid": "1be3445e-3f86-4c4d-9a7d-bb1421b44398", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43007", "type": "seen", "source": "https://t.me/cvedetector/25144", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43007 - SAP Service Parts Management Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43007 \nPublished : May 13, 2025, 1:15 a.m. | 1\u00a0hour, 25\u00a0minutes ago \nDescription : SAP Service Parts Management (SPM) does not perform necessary authorization checks for an authenticated user, allowing an attacker to escalate privileges. This has low impact on confidentiality, integrity and availability of the application. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-13T05:30:18.000000Z"}]}