{"uuid": "957e281d-e5f1-4b69-ad5b-de3eaa1faab9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3043", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9835", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3043\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, has been found in GuoMinJim PersonManage 1.0. This issue affects the function preHandle of the file /login/. The manipulation of the argument Request leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.\n\ud83d\udccf Published: 2025-04-01T00:31:04.410Z\n\ud83d\udccf Modified: 2025-04-01T03:46:36.828Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.302105\n2. https://vuldb.com/?ctiid.302105\n3. https://vuldb.com/?submit.524949\n4. https://github.com/GuoMinJim/PersonManage/issues/7\n5. https://github.com/GuoMinJim/PersonManage/issues/7#issue-2939940887", "creation_timestamp": "2025-04-01T04:32:06.000000Z"}