{"vulnerability": "CVE-2025-5964", "sightings": [{"uuid": "67220920-4f9d-494c-a465-cd2b129285ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5964", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lrog5pkesl2r", "content": "", "creation_timestamp": "2025-06-15T21:33:23.437914Z"}, {"uuid": "10753e56-d5c6-445b-9e26-55b5537055d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5964", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18386", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-5964\n\ud83d\udd25 CVSS Score: 8.4 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:N/RE:M/U:Green)\n\ud83d\udd39 Description: A path traversal issue in the API endpoint in M-Files Server before version 25.6.14925.0 allows an authenticated user to read files in the server.\n\ud83d\udccf Published: 2025-06-15T19:42:24.617Z\n\ud83d\udccf Modified: 2025-06-15T19:42:24.617Z\n\ud83d\udd17 References:\n1. https://product.m-files.com/security-advisories/cve-2025-5964", "creation_timestamp": "2025-06-15T20:39:24.000000Z"}, {"uuid": "89ebc20a-ba6c-42dd-bd6b-7d0c753a7fdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5964", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114689414585441654", "content": "", "creation_timestamp": "2025-06-15T21:06:26.076961Z"}, {"uuid": "635f72a4-fcdb-4a1e-9606-01c0f77f45e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5964", "type": "published-proof-of-concept", "source": "Telegram/lAQs7iLMTeKywVJ6hCEStxwD0rOtdV8T_GHqbSXrD-bt_EI", "content": "", "creation_timestamp": "2025-06-17T09:00:05.000000Z"}, {"uuid": "ad56000e-47b9-4912-9633-e5fe150bf6c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5964", "type": "seen", "source": "Telegram/qqGdRq_3IEZWlesNnwy1ijPtikCMQVd1aEhfCMytKb8KLZk", "content": "", "creation_timestamp": "2025-06-15T21:00:28.000000Z"}, {"uuid": "39563173-48a5-4776-820a-a5e0b287663f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5964", "type": "published-proof-of-concept", "source": "Telegram/sG5bEwqwg0wbu2257U_AVP1n6oi1Vbx9RKpot1MOV_JIWfY", "content": "", "creation_timestamp": "2025-06-18T11:00:06.000000Z"}, {"uuid": "deeda1ce-a1d7-4856-a2f4-90633d14b396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-5964", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/40752", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aC PoC language for emulating path traversal vulnerability (CVE-2025-5964) in M-Files25.6.14925.0\nURL\uff1ahttps://github.com/byteReaper77/CVE-2025-5964-\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-17T01:32:31.000000Z"}]}