{"uuid": "1e486cf7-6302-454b-991e-c2673c40b4bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2885", "type": "seen", "source": "https://t.me/cvedetector/21340", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2885 - Apache HTTP Server XML External Entity (XXE) Injection\", \n  \"Content\": \"CVE ID : CVE-2025-2885 \nPublished : March 27, 2025, 11:15 p.m. | 38\u00a0minutes ago \nDescription : Missing validation of the root metatdata version number could allow an actor to supply an arbitrary version number to the client instead of the intended version in the root metadata file, altering the version fetched by the client. Users should upgrade to tough version 0.20.0 or later and ensure any forked or derivative code is patched to incorporate the new fixes. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-28T01:01:04.000000Z"}