{"uuid": "9e5f02aa-c603-4b78-87e0-f11b7946488c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22389", "type": "seen", "source": "https://t.me/cvedetector/14256", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-22389 - Optimizely EPiServer CMS File Upload Vulnerability - Remote File Execution\", \n  \"Content\": \"CVE ID : CVE-2025-22389 \nPublished : Jan. 4, 2025, 2:15 a.m. | 28\u00a0minutes ago \nDescription : An issue was discovered in Optimizely EPiServer.CMS.Core before 12.32.0. A medium-severity vulnerability exists in the CMS, where the application does not properly validate uploaded files. This allows the upload of potentially malicious file types, including .docm .html. When accessed by application users, these files can be used to execute malicious actions or compromise users' systems. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-04T03:53:14.000000Z"}