{"vulnerability": "CVE-2025-4742", "sightings": [{"uuid": "51df649e-cb2b-40fe-9fdf-dc3cba98413b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47423", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-47423.yaml", "content": "", "creation_timestamp": "2025-06-18T12:10:04.000000Z"}, {"uuid": "169812b1-cc06-48d8-bfd4-3f72889ff529", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47423", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lrygbxkx5e2c", "content": "", "creation_timestamp": "2025-06-19T21:02:25.539873Z"}, {"uuid": "6f94be6f-948f-4b25-bda5-97934afe40c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47420", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lok3r3c3bqe2", "content": "", "creation_timestamp": "2025-05-07T00:03:23.016875Z"}, {"uuid": "786ae9e5-022d-44ae-a763-856138046cd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47420", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lokdlfittq2p", "content": "", "creation_timestamp": "2025-05-07T02:21:09.366010Z"}, {"uuid": "bbd900f3-47da-4867-bff3-70a76f5200b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47422", "type": "seen", "source": "MISP/853ff921-86fb-463b-bc2a-2860bf336b81", "content": "", "creation_timestamp": "2025-08-06T01:04:20.000000Z"}, {"uuid": "7aac5dbc-9317-4120-84cc-8ea9d2c1d8f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47423", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lomgxve2zf2j", "content": "", "creation_timestamp": "2025-05-07T22:27:13.866581Z"}, {"uuid": "b9c4c6be-7e9b-4711-93d8-47a811e1d378", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47424", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lorvkxxvrx2j", "content": "", "creation_timestamp": "2025-05-10T02:31:38.928368Z"}, {"uuid": "2ed316f0-9c28-496f-b321-5bc4e1a94be0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4742", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpbb3u672h2t", "content": "", "creation_timestamp": "2025-05-16T05:07:54.827762Z"}, {"uuid": "3c86e5a4-7c3b-4a85-b532-89a0342ad979", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47422", "type": "seen", "source": "MISP/853ff921-86fb-463b-bc2a-2860bf336b81", "content": "", "creation_timestamp": "2025-08-21T10:03:54.000000Z"}, {"uuid": "4473d4b0-b7f0-46dd-a7a8-da5e85bbb64a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47424", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15856", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47424\n\ud83d\udd25 CVSS Score: 7.1 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C)\n\ud83d\udd39 Description: Retool (self-hosted) before 3.196.0 allows Host header injection. When the BASE_DOMAIN environment variable is not set, the HTTP host header can be manipulated.\n\ud83d\udccf Published: 2025-05-09T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-09T23:14:37.884Z\n\ud83d\udd17 References:\n1. https://docs.retool.com/disclosures/cve-2025-47424", "creation_timestamp": "2025-05-09T23:25:47.000000Z"}, {"uuid": "9de5d4b1-95bd-47b7-81d7-a27c3e97fbe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47421", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lxwun2kre22a", "content": "", "creation_timestamp": "2025-09-03T14:44:58.720313Z"}, {"uuid": "e1df6dbc-2a21-4b4b-a386-6f78fc547b5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47420", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15235", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47420\n\ud83d\udd25 CVSS Score: 8.7 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: 266 vulnerability in Crestron Automate VX allows Privilege Escalation.This issue affects Automate VX: from 5.6.8161.21536 through 6.4.0.49.\n\ud83d\udccf Published: 2025-05-06T21:33:39.188Z\n\ud83d\udccf Modified: 2025-05-06T21:33:39.188Z\n\ud83d\udd17 References:\n1. https://security.crestron.com/\n2. https://www.crestron.com/Software-Firmware/Software/Automate-VX-Software/6-4-1-8\n3. https://www.crestron.com/release_notes/automate_vx_6.4.1.8_release_notes.pdf", "creation_timestamp": "2025-05-06T22:23:34.000000Z"}, {"uuid": "efb97ca9-5ceb-4ccb-a10e-a2558a322f19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47420", "type": "seen", "source": "Telegram/4Ig6yUlvTQ5DN23aHBwddKBNs5wD-tq-KgSviDLuL9Qogy4", "content": "", "creation_timestamp": "2025-05-07T00:30:19.000000Z"}, {"uuid": "3e2eb0cb-6df3-4f03-8770-ec4fd8814560", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4742", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16611", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4742\n\ud83d\udd25 CVSS Score: 4.8 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as problematic has been found in XU-YIJIE grpo-flat up to 9024b43f091e2eb9bac65802b120c0b35f9ba856. Affected is the function main of the file grpo_vanilla.py. The manipulation leads to deserialization. Local access is required to approach this attack. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.\n\ud83d\udccf Published: 2025-05-16T03:00:09.043Z\n\ud83d\udccf Modified: 2025-05-16T03:00:09.043Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309042\n2. https://vuldb.com/?ctiid.309042\n3. https://vuldb.com/?submit.570923\n4. https://github.com/XU-YIJIE/grpo-flat/issues/3", "creation_timestamp": "2025-05-16T03:34:24.000000Z"}, {"uuid": "3c65e3cb-90af-4395-8771-d016ab6605f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47424", "type": "seen", "source": "https://t.me/cvedetector/24986", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47424 - Retool Host Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-47424 \nPublished : May 9, 2025, 11:15 p.m. | 1\u00a0hour, 6\u00a0minutes ago \nDescription : Retool (self-hosted) before 3.196.0 allows Host header injection. When the BASE_DOMAIN environment variable is not set, the HTTP host header can be manipulated. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-10T03:04:57.000000Z"}, {"uuid": "23d05bae-b270-41bb-a160-eb6a3d08f4c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47420", "type": "seen", "source": "https://t.me/cvedetector/24659", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47420 - Crestron Automate VX Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-47420 \nPublished : May 6, 2025, 10:15 p.m. | 2\u00a0hours, 1\u00a0minute ago \nDescription : 266 vulnerability in Crestron Automate VX allows Privilege Escalation.This issue affects Automate VX: from 5.6.8161.21536 through 6.4.0.49. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T03:01:57.000000Z"}, {"uuid": "180642b8-9930-4d93-a8c4-d628ae5a3188", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47423", "type": "published-proof-of-concept", "source": "https://t.me/cvedetector/24737", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47423 - Furbo Personal Weather Station File Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-47423 \nPublished : May 7, 2025, 6:15 p.m. | 26\u00a0minutes ago \nDescription : Personal Weather Station Dashboard 12_lts allows unauthenticated remote attackers to read arbitrary files via ../ directory traversal in the test parameter to /others/_test.php, as demonstrated by reading the server's private SSL key in cleartext. \nSeverity: 5.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T21:31:35.000000Z"}]}