{"uuid": "9b0e760f-945b-4c03-9a09-9e9be0bd701f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27146", "type": "seen", "source": "https://t.me/cvedetector/18922", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27146 - Matrix Appservice IRC Arbitrary IRC Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-27146 \nPublished : Feb. 25, 2025, 8:15 p.m. | 1\u00a0hour, 55\u00a0minutes ago \nDescription : matrix-appservice-irc is a Node.js IRC bridge for Matrix. The matrix-appservice-irc bridge up to version 3.0.3 contains a vulnerability which can lead to arbitrary IRC command execution as the puppeted user. The attacker can only inject commands executed as their own IRC user. The vulnerability has been patched in matrix-appservice-irc version 3.0.4. \nSeverity: 2.7 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"25 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-25T23:14:24.000000Z"}