{"vulnerability": "CVE-2025-46616", "sightings": [{"uuid": "dce7f042-d665-400c-b2ef-faad55a6b098", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://bsky.app/profile/justineo.bsky.social/post/3lsv2okawks2r", "content": "", "creation_timestamp": "2025-07-01T06:21:53.196127Z"}, {"uuid": "e59b8c46-aae3-4351-845b-df9e2d13366f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lnx7kxbyys2m", "content": "", "creation_timestamp": "2025-04-29T11:48:43.497787Z"}, {"uuid": "265d3f50-e71e-441e-8c2b-3cf51fe3f8a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lnmobfwqrcz2", "content": "", "creation_timestamp": "2025-04-25T07:12:41.844890Z"}, {"uuid": "23743fae-8e12-475f-953f-8691b4feb7e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnms2m33jg2y", "content": "", "creation_timestamp": "2025-04-25T08:20:18.262254Z"}, {"uuid": "3f83439a-5ab4-430b-8a38-46e4bbb3cdc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114397971373382349", "content": "", "creation_timestamp": "2025-04-25T09:48:34.851722Z"}, {"uuid": "91ea6996-d5d7-4057-a75a-874e13595b0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lnnabrq53a25", "content": "", "creation_timestamp": "2025-04-25T12:34:51.200821Z"}, {"uuid": "a56e4804-c385-4b70-bf8f-ede8ee67e341", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114398817254860717", "content": "", "creation_timestamp": "2025-04-25T13:23:41.981689Z"}, {"uuid": "1e54d52a-1c3a-440f-926b-93f17b4b9af5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lnw4x3c5os2t", "content": "", "creation_timestamp": "2025-04-29T01:29:09.430782Z"}, {"uuid": "a9676e2d-fcbf-417f-95df-ac4e6c03f43f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13390", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-46616\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: Quantum StorNext Web GUI API before 7.2.4 allows potential Arbitrary Remote Code Execution (RCE) via upload of a file. This affects StorNext RYO before 7.2.4, StorNext Xcellis Workflow Director before 7.2.4, and ActiveScale Cold Storage.\n\ud83d\udccf Published: 2025-04-25T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-25T06:36:30.847Z\n\ud83d\udd17 References:\n1. https://www.quantum.com/en/service-support/security-bulletins/stornext-gui-multiple-security-vulnerabilities-stornext-gui-multiple-security-vulnerabilities/", "creation_timestamp": "2025-04-25T07:07:19.000000Z"}, {"uuid": "46366d66-5df2-4007-9775-2482c32aac90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "published-proof-of-concept", "source": "Telegram/h03BTlMVhsmhX6D7e2vIwa5HqRH7sazB1QZ_U1Au3scT3K4", "content": "", "creation_timestamp": "2025-04-25T10:01:15.000000Z"}, {"uuid": "715b4cc7-d43f-482a-add2-a2b5d04cce3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-46616", "type": "seen", "source": "https://t.me/cvedetector/23742", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-46616 - Quantum StorNext Web GUI API RCE\", \n  \"Content\": \"CVE ID : CVE-2025-46616 \nPublished : April 25, 2025, 7:15 a.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : Quantum StorNext Web GUI API before 7.2.4 allows potential Arbitrary Remote Code Execution (RCE) via upload of a file. This affects StorNext RYO before 7.2.4, StorNext Xcellis Workflow Director before 7.2.4, and ActiveScale Cold Storage. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-25T10:49:37.000000Z"}]}