{"vulnerability": "CVE-2025-4769", "sightings": [{"uuid": "6be725a7-3a3d-4e54-a185-32c43a3f5a11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4769", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3lpbufgbnbn2o", "content": "", "creation_timestamp": "2025-05-16T10:53:14.984341Z"}, {"uuid": "8d69f4ff-7e90-4121-ab32-4f7723c6c12d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4769", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lpbv7f6hbya2", "content": "", "creation_timestamp": "2025-05-16T11:09:10.537608Z"}, {"uuid": "269d2436-57a9-442d-a885-5a56ff69cad4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4769", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lpc3nxne5m2h", "content": "", "creation_timestamp": "2025-05-16T13:03:18.927601Z"}, {"uuid": "148ccdf9-5ab2-4bed-835e-25414cb3d446", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47692", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lolzke2kak2h", "content": "", "creation_timestamp": "2025-05-07T18:26:59.363167Z"}, {"uuid": "cc9f4335-d1aa-4875-a062-052a500dcd37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47691", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lolzkevo5m2t", "content": "", "creation_timestamp": "2025-05-07T18:27:04.185613Z"}, {"uuid": "769bc0ae-440a-4089-beb2-e5201a138803", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47690", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lptw6msupe2q", "content": "", "creation_timestamp": "2025-05-23T15:13:09.334534Z"}, {"uuid": "a42ca1fc-8596-4c8a-81c2-db30c681c531", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47697", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqertjawd5e2", "content": "", "creation_timestamp": "2025-05-30T08:14:32.862589Z"}, {"uuid": "4773beb9-ae88-494d-9ffb-86cc854af2f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47696", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3luqgm4weme2f", "content": "", "creation_timestamp": "2025-07-24T21:02:21.545274Z"}, {"uuid": "bd8b3cfd-d762-4ea3-8bfb-abbd0b2f504d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47699", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3m3tshirw2a2o", "content": "", "creation_timestamp": "2025-10-23T07:08:51.739502Z"}, {"uuid": "29f8e035-e5f2-4c5f-acba-777cc141f574", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-47699", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3m3txazvqnl2w", "content": "", "creation_timestamp": "2025-10-23T08:34:44.048844Z"}, {"uuid": "5299533e-e451-4acf-b39a-23e81c0c5973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47698", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-261-06", "content": "", "creation_timestamp": "2025-09-18T10:00:00.000000Z"}, {"uuid": "246b39b9-7f66-4c0a-bb75-ff983a1aab66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47698", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lz5bwfvc272f", "content": "", "creation_timestamp": "2025-09-18T21:24:00.992042Z"}, {"uuid": "aca511c4-3d4c-46ec-941d-1abf424654c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-47696", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3lxofz2po7j24", "content": "", "creation_timestamp": "2025-08-31T06:01:58.064722Z"}, {"uuid": "30114927-8e9b-41bd-8edf-947d3a2692db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47696", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lxoip64npk2n", "content": "", "creation_timestamp": "2025-08-31T06:50:06.421687Z"}, {"uuid": "36780eb9-f126-4a50-a703-12f8765d0c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47693", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16706", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-47693\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in roninwp FAT Services Booking allows PHP Local File Inclusion. This issue affects FAT Services Booking: from n/a through 5.5.\n\ud83d\udccf Published: 2025-05-16T15:45:17.462Z\n\ud83d\udccf Modified: 2025-05-16T16:23:01.002Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/fat-services-booking/vulnerability/wordpress-fat-services-booking-plugin-5-5-local-file-inclusion-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-16T16:34:51.000000Z"}, {"uuid": "4baa4f7f-36fd-4533-a513-4c3eb271c29a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4769", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16675", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4769\n\ud83d\udd25 CVSS Score: 7.3 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical was found in CBEWIN Anytxt Searcher 1.3.1128.0. This vulnerability affects unknown code of the file ATService.exe. The manipulation leads to uncontrolled search path. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult.\n\ud83d\udccf Published: 2025-05-16T10:39:01.349Z\n\ud83d\udccf Modified: 2025-05-16T10:39:01.349Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.309070\n2. https://vuldb.com/?ctiid.309070\n3. https://vuldb.com/?submit.571820\n4. https://www.yuque.com/ba1ma0-an29k/nnxoap/ds2f8b1hdc4ng9zg?singleDoc", "creation_timestamp": "2025-05-16T11:34:55.000000Z"}, {"uuid": "424ff5f4-9536-4254-993d-e4bff19c6e0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47692", "type": "seen", "source": "https://t.me/cvedetector/24717", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47692 - ContentStudio Missing Authorization Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-47692 \nPublished : May 7, 2025, 3:16 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : Missing Authorization vulnerability in contentstudio ContentStudio allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ContentStudio: from n/a through 1.3.3. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T19:00:38.000000Z"}, {"uuid": "5e3689c5-f27c-4ce5-b910-e074ce519010", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-47691", "type": "seen", "source": "https://t.me/cvedetector/24722", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-47691 - Ultimate Member Code Injection\", \n  \"Content\": \"CVE ID : CVE-2025-47691 \nPublished : May 7, 2025, 3:16 p.m. | 1\u00a0hour, 24\u00a0minutes ago \nDescription : Improper Control of Generation of Code ('Code Injection') vulnerability in Ultimate Member Ultimate Member allows Code Injection. This issue affects Ultimate Member: from n/a through 2.10.3. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T19:00:45.000000Z"}]}