{"uuid": "e16c0bdd-3166-49b3-9df4-99f92b1632a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0473", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1950", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0473\n\ud83d\udd39 Description: Vulnerability in the PMB platform that allows an attacker to persist temporary files on the server, affecting versions 4.0.10 and above. This vulnerability exists in the file upload functionality on the \u2018/pmb/authorities/import/iimport_authorities\u2019 endpoint. When a file is uploaded via this resource, the server will create a temporary file that will be deleted after the client sends a POST request to \u2018/pmb/authorities/import/iimport_authorities\u2019. This workflow is automated by the web client, however an attacker can trap and launch the second POST request to prevent the temporary file from being deleted.\n\ud83d\udccf Published: 2025-01-16T13:09:14.896Z\n\ud83d\udccf Modified: 2025-01-16T13:09:14.896Z\n\ud83d\udd17 References:\n1. https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-pmb-platform", "creation_timestamp": "2025-01-16T13:55:54.000000Z"}