{"uuid": "950cecfc-6aa9-44c3-8e8e-faa3985fdcc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2516", "type": "seen", "source": "https://t.me/cvedetector/21303", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2516 - WPS Office (Kingsoft) Private Key Recovery and Man-in-the-Middle Attack\", \n  \"Content\": \"CVE ID : CVE-2025-2516 \nPublished : March 27, 2025, 3:16 p.m. | 20\u00a0minutes ago \nDescription : The use of a weak cryptographic key pair in the signature verification process in WPS Office (Kingsoft) on Windows allows an attacker who successfully recovered the private key to sign components.  \n  \nAs older versions of WPS Office did not validate the update server's certificate, an Adversary-In-The-Middle attack was possible allowing updates to be hijacked. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-27T16:39:15.000000Z"}