{"uuid": "3bc5daef-c438-4d00-907d-a1bd97f07464", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-23191", "type": "seen", "source": "https://t.me/cvedetector/17626", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23191 - SAP Fiori for SAP ERP Host Header Injection\", \n  \"Content\": \"CVE ID : CVE-2025-23191 \nPublished : Feb. 11, 2025, 1:15 a.m. | 31\u00a0minutes ago \nDescription : Cached values belonging to the SAP OData endpoint in SAP Fiori for SAP ERP could be poisoned by modifying the Host header value in an HTTP GET request. An attacker could alter the `atom:link` values in the returned metadata redirecting them from the SAP server to a malicious link set by the attacker. Successful exploitation could cause low impact on integrity of the application. \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T03:07:51.000000Z"}