{"vulnerability": "CVE-2025-4875", "sightings": [{"uuid": "c3e446cb-d339-4484-a524-4b8e3228fc3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48757", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lravj6ac5sf2", "content": "", "creation_timestamp": "2025-06-10T12:32:03.717462Z"}, {"uuid": "1797fe27-1cd7-428b-ac34-d907dea54d00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48751", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lpv5db3kxy42", "content": "", "creation_timestamp": "2025-05-24T02:53:44.037495Z"}, {"uuid": "7c208b25-8ad6-4df3-908b-5a5af4b64572", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48752", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lpv5dewwqj42", "content": "", "creation_timestamp": "2025-05-24T02:54:06.349716Z"}, {"uuid": "9ecd7eb0-2215-4ec3-8366-376a64898457", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48753", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lpv5dhfubod2", "content": "", "creation_timestamp": "2025-05-24T02:54:06.913873Z"}, {"uuid": "27ea0865-6a11-49b5-a8e0-027825463a5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48754", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lpv5dipt4uj2", "content": "", "creation_timestamp": "2025-05-24T02:54:07.443350Z"}, {"uuid": "b7ec2105-c089-45bc-a0eb-16d779f6a914", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48755", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lpv5dkqe7742", "content": "", "creation_timestamp": "2025-05-24T02:54:08.182255Z"}, {"uuid": "91a6fa32-2a03-4984-9d7f-9afdf57dcb40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48754", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114562881718704001", "content": "", "creation_timestamp": "2025-05-24T12:47:27.177146Z"}, {"uuid": "af285f39-cdde-4a78-9f2d-978cc0532539", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48757", "type": "seen", "source": "https://bsky.app/profile/codepo8.bsky.social/post/3lqrwxmxvtc2n", "content": "", "creation_timestamp": "2025-06-04T13:47:02.429031Z"}, {"uuid": "55ef0064-853a-49c0-bddd-1ede9bd312f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48757", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lrchm6v4v225", "content": "", "creation_timestamp": "2025-06-11T03:27:27.504257Z"}, {"uuid": "6f161910-1df9-417c-bb8b-2a76ab04541e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48757", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lqe7h52e6gt2", "content": "", "creation_timestamp": "2025-05-30T02:41:44.439783Z"}, {"uuid": "62c062da-8dbf-4267-92b1-27bae034d53f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4875", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lphkjyslv52o", "content": "", "creation_timestamp": "2025-05-18T17:12:52.759329Z"}, {"uuid": "f813815e-cd13-4bb3-88e4-d8dfc125bd1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48757", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lqel75gp562q", "content": "", "creation_timestamp": "2025-05-30T06:11:51.245459Z"}, {"uuid": "2547cb42-6a56-4c95-a4fe-f844a25a805a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-4875", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lphawamwyee2", "content": "", "creation_timestamp": "2025-05-18T14:20:49.459859Z"}, {"uuid": "31ffb033-08ce-438f-988a-70ef0746526d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48755", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17478", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48755\n\ud83d\udd25 CVSS Score: 2.9 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: In the spiral-rs crate 0.2.0 for Rust, allocation can be attempted for a ZST (zero-sized type).\n\ud83d\udccf Published: 2025-05-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-24T02:19:51.321Z\n\ud83d\udd17 References:\n1. https://github.com/blyssprivacy/sdk/issues/36\n2. https://crates.io/crates/spiral-rs", "creation_timestamp": "2025-05-24T03:52:13.000000Z"}, {"uuid": "71874021-7323-4c3d-a4ff-af372e13a1b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48757", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lra75e26yx2f", "content": "", "creation_timestamp": "2025-06-10T05:50:39.221885Z"}, {"uuid": "6c58fbe6-aedc-4c8d-b40c-d155df707f1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48751", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17476", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48751\n\ud83d\udd25 CVSS Score: 2.9 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: The process_lock crate 0.1.0 for Rust allows data races in unlock.\n\ud83d\udccf Published: 2025-05-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-24T02:28:53.227Z\n\ud83d\udd17 References:\n1. https://github.com/tickbh/ProcessLock/issues/1\n2. https://crates.io/crates/process_lock", "creation_timestamp": "2025-05-24T03:45:44.000000Z"}, {"uuid": "fc727e39-2609-4713-b80c-1a8a0d2fdf92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48756", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lpv5czpx7s42", "content": "", "creation_timestamp": "2025-05-24T02:53:41.736165Z"}, {"uuid": "78fc027a-eb9c-4aca-89cf-7b6074fb94fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48757", "type": "published-proof-of-concept", "source": "Telegram/Qn5Ivb0hY_RRFbz3_smbJhwPSq3L1UkRwhbZcM0sFXYUsHw", "content": "", "creation_timestamp": "2026-04-01T15:00:14.000000Z"}, {"uuid": "267a35ec-5cae-4e44-bcf4-eb0376638d1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48757", "type": "seen", "source": "Telegram/IgMXaUeI6SNBAHCh-M4SenGrw1gGeF6CA1UICLI_4bYZDIs", "content": "", "creation_timestamp": "2026-05-01T15:00:06.000000Z"}, {"uuid": "a0075b13-8e36-453c-b49c-02f7d745f30e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48757", "type": "seen", "source": "Telegram/bldpaU4Fd3K5P_BYQnPbX8yM0aEM2e48CWOaj1lIbI-n9P0", "content": "", "creation_timestamp": "2026-05-01T15:00:14.000000Z"}, {"uuid": "f7a7a988-6d7f-49d6-9ecd-864e64801da9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-48757", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18138", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-48757\n\ud83d\udd25 CVSS Score: 9.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N)\n\ud83d\udd39 Description: An insufficient database Row-Level Security policy in Lovable through 2025-04-15 allows remote unauthenticated attackers to read or write to arbitrary database tables of generated sites.\n\ud83d\udccf Published: 2025-05-30T00:00:00.000Z\n\ud83d\udccf Modified: 2025-06-11T20:05:09.273Z\n\ud83d\udd17 References:\n1. https://docs.lovable.dev/changelog\n2. https://mattpalmer.io/posts/CVE-2025-48757/\n3. https://gist.github.com/lhchavez/625ee42a6c408a850d35e50f8e649de9\n4. https://x.com/danialasaria/status/1911862269996118272\n5. https://mattpalmer.io/posts/statement-on-CVE-2025-48757/", "creation_timestamp": "2025-06-11T20:35:48.000000Z"}]}