{"uuid": "42f517d2-be28-4857-a23a-a47cd1e29249", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-43703", "type": "seen", "source": "https://t.me/cvedetector/23201", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-43703 - Anki Ankitects API Key Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-43703 \nPublished : April 16, 2025, 10:15 p.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : An issue was discovered in Ankitects Anki through 25.02. A crafted shared deck can result in attacker-controlled access to the internal API (even though the attacker has no knowledge of an API key) through approaches such as scripts or the SRC attribute of an IMG element. NOTE: this issue exists because of an incomplete fix for CVE-2024-32484. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T02:06:37.000000Z"}