{"vulnerability": "CVE-2025-43715", "sightings": [{"uuid": "c6fa3776-0604-4310-b2d3-6201c9952322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43715", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114351493478323215", "content": "", "creation_timestamp": "2025-04-17T04:48:38.807642Z"}, {"uuid": "4d2fe6b4-9eab-4dce-9741-3924551a16d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43715", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmyhsphhw32j", "content": "", "creation_timestamp": "2025-04-17T06:23:40.975541Z"}, {"uuid": "795975b1-ac3f-476c-9436-9fc0bf75368c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43715", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-254-01", "content": "", "creation_timestamp": "2025-09-11T10:00:00.000000Z"}, {"uuid": "97f5033e-bfdb-470a-a1dc-2dc4acad61cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43715", "type": "seen", "source": "https://t.me/cvedetector/23210", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43715 - NSIS Local Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43715 \nPublished : April 17, 2025, 3:15 a.m. | 55\u00a0minutes ago \nDescription : Nullsoft Scriptable Install System (NSIS) before 3.11 on Windows allows local users to escalate privileges to SYSTEM during an installation, because the temporary plugins directory is created under %WINDIR%\\temp and unprivileged users can place a crafted executable file by winning a race condition. This occurs because EW_CREATEDIR does not always set the CreateRestrictedDirectory error flag. \nSeverity: 8.1 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T06:17:24.000000Z"}, {"uuid": "7c1b42ef-bb0c-41de-a86e-bdbe13db03f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43715", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12178", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-43715\n\ud83d\udd25 CVSS Score: 8.1 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Nullsoft Scriptable Install System (NSIS) before 3.11 on Windows allows local users to escalate privileges to SYSTEM during an installation, because the temporary plugins directory is created under %WINDIR%\\temp and unprivileged users can place a crafted executable file by winning a race condition. This occurs because EW_CREATEDIR does not always set the CreateRestrictedDirectory error flag.\n\ud83d\udccf Published: 2025-04-17T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-17T02:15:09.285Z\n\ud83d\udd17 References:\n1. https://sourceforge.net/p/nsis/bugs/1315/\n2. https://nsis.sourceforge.io/Docs/AppendixF.html#v3.11-rl", "creation_timestamp": "2025-04-17T02:58:15.000000Z"}, {"uuid": "38088443-66db-469d-ba41-4cd6973de6fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-43715", "type": "seen", "source": "Telegram/K4SUIHTuLrzXNo_YZe-9I7i2BFdwldWu2-RSHzApAyjepqw", "content": "", "creation_timestamp": "2025-04-17T05:00:54.000000Z"}]}