{"vulnerability": "CVE-2025-4756", "sightings": [{"uuid": "9a16cc7f-99b7-4317-b977-0166890ed4f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47568", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lptv5s5xmj2o", "content": "", "creation_timestamp": "2025-05-23T14:54:47.659411Z"}, {"uuid": "3bb28bd2-529a-4ddd-8735-193b2ce43e06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4756", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpboainhi72r", "content": "", "creation_timestamp": "2025-05-16T09:03:11.480452Z"}, {"uuid": "9486ef2a-2f48-4b8d-9083-8cc17ec9dd70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47569", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lyghdit7cw2q", "content": "", "creation_timestamp": "2025-09-09T19:29:34.834615Z"}, {"uuid": "ee2164f2-a21c-4d7f-860d-d55453482026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47566", "type": "seen", "source": "https://gist.github.com/Darkcrai86/0f705377648c55f19c6926bcb4603e8e", "content": "", "creation_timestamp": "2026-01-02T08:03:06.000000Z"}, {"uuid": "f39c3aa3-67bf-4a15-8966-c554237c9d5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47561", "type": "seen", "source": "Telegram/EKi3juhW8KdvSrT-C52NnQYma9e80zcUs_26vGBIli1oz3UL", "content": "", "creation_timestamp": "2025-06-25T17:32:32.000000Z"}, {"uuid": "8ce1bff0-d706-445a-82cc-ae280721d338", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47566", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mbcsbcycru2y", "content": "", "creation_timestamp": "2025-12-31T21:21:18.640269Z"}, {"uuid": "a0ce30a0-5550-40d3-9d8a-15797939fe7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4756", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16663", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4756\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability was found in D-Link DI-7003GV2 24.04.18D1 R(68125). It has been declared as problematic. This vulnerability affects unknown code of the file /H5/restart.asp. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-05-16T07:31:05.830Z\n\ud83d\udccf Modified: 2025-05-16T07:31:05.830Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309058\n2. https://vuldb.com/?ctiid.309058\n3. https://vuldb.com/?submit.571077\n4. https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/restart.md\n5. https://www.dlink.com/", "creation_timestamp": "2025-05-16T08:34:00.000000Z"}, {"uuid": "746f8c36-f828-405e-ad1c-17c6b9a7bd06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47564", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16708", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47564\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: Missing Authorization vulnerability in ashanjay EventON allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects EventON: from n/a through 4.9.9.\n\ud83d\udccf Published: 2025-05-16T15:45:18.579Z\n\ud83d\udccf Modified: 2025-05-16T16:22:26.033Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/eventon/vulnerability/wordpress-eventon-plugin-4-9-9-broken-access-control-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T16:34:55.000000Z"}, {"uuid": "3cb2c2bd-935a-4142-99b1-cedff2479557", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47567", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16707", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47567\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L)\n\ud83d\udd39 Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LambertGroup Video Player &amp; FullScreen Video Background allows Blind SQL Injection. This issue affects Video Player &amp; FullScreen Video Background: from n/a through 2.4.1.\n\ud83d\udccf Published: 2025-05-16T15:45:18.030Z\n\ud83d\udccf Modified: 2025-05-16T16:22:44.331Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/universal-video-player-and-bg/vulnerability/wordpress-video-player-fullscreen-video-background-plugin-2-4-1-sql-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T16:34:52.000000Z"}, {"uuid": "2015c0c3-5749-4c58-be3d-58ed801e486a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47562", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16731", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47562\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Improper Control of Generation of Code ('Code Injection') vulnerability in RomanCode MapSVG allows Code Injection. This issue affects MapSVG: from n/a through 8.5.34.\n\ud83d\udccf Published: 2025-05-16T15:45:19.655Z\n\ud83d\udccf Modified: 2025-05-16T16:49:54.917Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/mapsvg/vulnerability/wordpress-mapsvg-8-5-34-content-injection-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T17:35:00.000000Z"}, {"uuid": "8e937bde-0232-4b90-a69f-3c0df9db4c74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47563", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16730", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47563\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Missing Authorization vulnerability in villatheme CURCY allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects CURCY: from n/a through 2.3.7.\n\ud83d\udccf Published: 2025-05-16T15:45:19.130Z\n\ud83d\udccf Modified: 2025-05-16T16:50:05.579Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/woocommerce-multi-currency/vulnerability/wordpress-curcy-plugin-2-3-7-arbitrary-shortcode-execution-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T17:34:58.000000Z"}, {"uuid": "83781a8f-9b84-49a2-b327-5cfbc6681548", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47560", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16732", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47560\n\ud83d\udd25 CVSS Score: 5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N)\n\ud83d\udd39 Description: Missing Authorization vulnerability in RomanCode MapSVG allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MapSVG: from n/a through 8.5.32.\n\ud83d\udccf Published: 2025-05-16T15:45:20.185Z\n\ud83d\udccf Modified: 2025-05-16T16:49:47.283Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/mapsvg/vulnerability/wordpress-mapsvg-plugin-8-5-32-broken-access-control-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T17:35:01.000000Z"}, {"uuid": "ea5dfc4d-4ca3-4f40-9691-32cf7f66ace9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47561", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17728", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47561\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Incorrect Privilege Assignment vulnerability in RomanCode MapSVG allows Privilege Escalation. This issue affects MapSVG: from n/a through 8.5.34.\n\ud83d\udccf Published: 2025-06-09T15:54:09.280Z\n\ud83d\udccf Modified: 2025-06-09T17:23:13.677Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/mapsvg/vulnerability/wordpress-mapsvg-8-5-34-privilege-escalation-vulnerability?_s_id=cve", "creation_timestamp": "2025-06-09T18:11:15.000000Z"}, {"uuid": "b77f9138-124b-4c4f-ba15-b89bfb51b372", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47561", "type": "seen", "source": "Telegram/-QOyMiowJoIyiMyTWDmr53uOV1Gxrf1KetOkwLf9_gvu4z0", "content": "", "creation_timestamp": "2025-06-25T00:39:14.000000Z"}, {"uuid": "7fbd8470-725f-4d3d-992b-47fe1cb29f31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47561", "type": "seen", "source": "Telegram/nVjbyWi1OTQqVrCfCpVg9HGjFoxjWvVL_Heny3L18ja2tx5m", "content": "", "creation_timestamp": "2025-06-25T00:39:13.000000Z"}]}