<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-05T11:09:50.116884+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/f594e64a-63c6-42b1-a0e1-892cc125ba6a/export</id>
    <title>f594e64a-63c6-42b1-a0e1-892cc125ba6a</title>
    <updated>2026-05-05T11:09:50.529212+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f594e64a-63c6-42b1-a0e1-892cc125ba6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-GCCQ-H3XJ-JGVF", "type": "seen", "source": "https://t.me/ctinow/183210", "content": "https://ift.tt/mh6kLVd\n[GHSA-gccq-h3xj-jgvf] Pixelfed doesn't check OAuth Scopes in API routes, giving elevated permissions", "creation_timestamp": "2024-02-12T16:26:28.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f594e64a-63c6-42b1-a0e1-892cc125ba6a/export"/>
    <published>2024-02-12T16:26:28+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/35952afd-4de7-4ff9-9b08-3d397308eaee/export</id>
    <title>35952afd-4de7-4ff9-9b08-3d397308eaee</title>
    <updated>2026-05-05T11:09:50.528094+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "35952afd-4de7-4ff9-9b08-3d397308eaee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-GCCQ-H3XJ-JGVF", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15430", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-25108\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L)\n\ud83d\udd39 Description: Pixelfed is an open source photo sharing platform. When processing requests authorization was improperly and insufficiently checked, allowing attackers to access far more functionality than users intended, including to the administrative and moderator functionality of the Pixelfed server. This vulnerability affects every version of Pixelfed between v0.10.4 and v0.11.9, inclusive. A proof of concept of this vulnerability exists. This vulnerability affects every local user of a Pixelfed server, and can potentially affect the servers' ability to federate. Some user interaction is required to setup the conditions to be able to exercise the vulnerability, but the attacker could conduct this attack time-delayed manner, where user interaction is not actively required. This vulnerability has been addressed in version 0.11.11. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\ud83d\udccf Published: 2024-02-12T20:05:23.549Z\n\ud83d\udccf Modified: 2025-05-07T21:03:35.510Z\n\ud83d\udd17 References:\n1. https://github.com/pixelfed/pixelfed/security/advisories/GHSA-gccq-h3xj-jgvf\n2. https://github.com/pixelfed/pixelfed/commit/7e47d6dccb0393a2e95c42813c562c854882b037", "creation_timestamp": "2025-05-07T21:22:43.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/35952afd-4de7-4ff9-9b08-3d397308eaee/export"/>
    <published>2025-05-07T21:22:43+00:00</published>
  </entry>
</feed>
