{"uuid": "4ddcb97a-8440-4ce5-a1c2-6b36940695b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3519", "type": "seen", "source": "https://t.me/cvedetector/23489", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3519 - Unblu Spark Authorization Bypass File Replacement\", \n  \"Content\": \"CVE ID : CVE-2025-3519 \nPublished : April 22, 2025, 9:15 a.m. | 40\u00a0minutes ago \nDescription : An authorization bypass\u00a0in\u00a0Unblu Spark allows a\u00a0participant of a conversation\u00a0to replace an existing, uploaded file.  \n  \nEvery uploaded file in Unblu gets assigned with a randomly generated Universally Unique ID (UUID). In case a participant of this or another conversation gets access to such a file ID, it can be used to replace the file without changing the file name and details or the name of the user who uploaded the file. During the upload, file interception and allowed file type rules are still applied correctly. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T12:33:00.000000Z"}