<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Wed, 13 May 2026 02:22:56 +0000</lastBuildDate>
    <item>
      <title>a6bc277f-188f-42cf-b74e-e79d1bd80d24</title>
      <link>https://db.gcve.eu/sighting/a6bc277f-188f-42cf-b74e-e79d1bd80d24/export</link>
      <description>{"uuid": "a6bc277f-188f-42cf-b74e-e79d1bd80d24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25586", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkoihz7bkh2n", "content": "", "creation_timestamp": "2025-03-18T20:18:38.303991Z"}</description>
      <content:encoded>{"uuid": "a6bc277f-188f-42cf-b74e-e79d1bd80d24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25586", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkoihz7bkh2n", "content": "", "creation_timestamp": "2025-03-18T20:18:38.303991Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a6bc277f-188f-42cf-b74e-e79d1bd80d24/export</guid>
      <pubDate>Tue, 18 Mar 2025 20:18:38 +0000</pubDate>
    </item>
    <item>
      <title>257359d2-aa1d-46ae-882d-2e68ad570de3</title>
      <link>https://db.gcve.eu/sighting/257359d2-aa1d-46ae-882d-2e68ad570de3/export</link>
      <description>{"uuid": "257359d2-aa1d-46ae-882d-2e68ad570de3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25589", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8343", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25589\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An XML external entity (XXE) injection vulnerability in the component /weixin/aes/XMLParse.java of yimioa before v2024.07.04 allows attackers to execute arbitrary code via supplying a crafted XML file.\n\ud83d\udccf Published: 2025-03-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T13:35:19.864Z\n\ud83d\udd17 References:\n1. https://gitee.com/r1bbit/yimioa/issues/IBI81R", "creation_timestamp": "2025-03-21T14:19:16.000000Z"}</description>
      <content:encoded>{"uuid": "257359d2-aa1d-46ae-882d-2e68ad570de3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25589", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8343", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-25589\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An XML external entity (XXE) injection vulnerability in the component /weixin/aes/XMLParse.java of yimioa before v2024.07.04 allows attackers to execute arbitrary code via supplying a crafted XML file.\n\ud83d\udccf Published: 2025-03-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-21T13:35:19.864Z\n\ud83d\udd17 References:\n1. https://gitee.com/r1bbit/yimioa/issues/IBI81R", "creation_timestamp": "2025-03-21T14:19:16.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/257359d2-aa1d-46ae-882d-2e68ad570de3/export</guid>
      <pubDate>Fri, 21 Mar 2025 14:19:16 +0000</pubDate>
    </item>
    <item>
      <title>78f2c08a-61d9-4f40-9054-1bc16ed2b5b5</title>
      <link>https://db.gcve.eu/sighting/78f2c08a-61d9-4f40-9054-1bc16ed2b5b5/export</link>
      <description>{"uuid": "78f2c08a-61d9-4f40-9054-1bc16ed2b5b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2558", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2558\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The-wound WordPress theme through 0.0.1 does not validate some parameters before using them to generate paths passed to include function/s, allowing unauthenticated users to perform LFI attacks and download arbitrary file from the server\n\ud83d\udccf Published: 2025-04-24T06:00:07.297Z\n\ud83d\udccf Modified: 2025-04-24T06:00:07.297Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/6a8e1c89-a01d-4347-91fc-ba454784b153/", "creation_timestamp": "2025-04-24T06:05:34.000000Z"}</description>
      <content:encoded>{"uuid": "78f2c08a-61d9-4f40-9054-1bc16ed2b5b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2558", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13190", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2558\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: The-wound WordPress theme through 0.0.1 does not validate some parameters before using them to generate paths passed to include function/s, allowing unauthenticated users to perform LFI attacks and download arbitrary file from the server\n\ud83d\udccf Published: 2025-04-24T06:00:07.297Z\n\ud83d\udccf Modified: 2025-04-24T06:00:07.297Z\n\ud83d\udd17 References:\n1. https://wpscan.com/vulnerability/6a8e1c89-a01d-4347-91fc-ba454784b153/", "creation_timestamp": "2025-04-24T06:05:34.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/78f2c08a-61d9-4f40-9054-1bc16ed2b5b5/export</guid>
      <pubDate>Thu, 24 Apr 2025 06:05:34 +0000</pubDate>
    </item>
    <item>
      <title>2283eee9-6163-4eeb-b840-267427e9c092</title>
      <link>https://db.gcve.eu/sighting/2283eee9-6163-4eeb-b840-267427e9c092/export</link>
      <description>{"uuid": "2283eee9-6163-4eeb-b840-267427e9c092", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2558", "type": "seen", "source": "https://t.me/cvedetector/23640", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2558 - \"WordPress Theme-Wound LFI Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2558 \nPublished : April 24, 2025, 6:15 a.m. | 14\u00a0minutes ago \nDescription : The-wound WordPress theme through 0.0.1 does not validate some parameters before using them to generate paths passed to include function/s, allowing unauthenticated users to perform LFI attacks and download arbitrary file from the server \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-24T08:52:53.000000Z"}</description>
      <content:encoded>{"uuid": "2283eee9-6163-4eeb-b840-267427e9c092", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2558", "type": "seen", "source": "https://t.me/cvedetector/23640", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2558 - \"WordPress Theme-Wound LFI Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2558 \nPublished : April 24, 2025, 6:15 a.m. | 14\u00a0minutes ago \nDescription : The-wound WordPress theme through 0.0.1 does not validate some parameters before using them to generate paths passed to include function/s, allowing unauthenticated users to perform LFI attacks and download arbitrary file from the server \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"24 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-24T08:52:53.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2283eee9-6163-4eeb-b840-267427e9c092/export</guid>
      <pubDate>Thu, 24 Apr 2025 08:52:53 +0000</pubDate>
    </item>
    <item>
      <title>aa079301-41ca-4d99-9a27-01352977c100</title>
      <link>https://db.gcve.eu/sighting/aa079301-41ca-4d99-9a27-01352977c100/export</link>
      <description>{"uuid": "aa079301-41ca-4d99-9a27-01352977c100", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2558", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnkenucnex2r", "content": "", "creation_timestamp": "2025-04-24T09:15:13.020591Z"}</description>
      <content:encoded>{"uuid": "aa079301-41ca-4d99-9a27-01352977c100", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2558", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lnkenucnex2r", "content": "", "creation_timestamp": "2025-04-24T09:15:13.020591Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/aa079301-41ca-4d99-9a27-01352977c100/export</guid>
      <pubDate>Thu, 24 Apr 2025 09:15:13 +0000</pubDate>
    </item>
    <item>
      <title>2e6254db-01d7-44f6-ac38-5e47b5c3c678</title>
      <link>https://db.gcve.eu/sighting/2e6254db-01d7-44f6-ac38-5e47b5c3c678/export</link>
      <description>{"uuid": "2e6254db-01d7-44f6-ac38-5e47b5c3c678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2558", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114394194900112274", "content": "", "creation_timestamp": "2025-04-24T17:48:11.895543Z"}</description>
      <content:encoded>{"uuid": "2e6254db-01d7-44f6-ac38-5e47b5c3c678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2558", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114394194900112274", "content": "", "creation_timestamp": "2025-04-24T17:48:11.895543Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/2e6254db-01d7-44f6-ac38-5e47b5c3c678/export</guid>
      <pubDate>Thu, 24 Apr 2025 17:48:11 +0000</pubDate>
    </item>
    <item>
      <title>0ed2034e-1e47-42b4-80b7-0d1861e7fc09</title>
      <link>https://db.gcve.eu/sighting/0ed2034e-1e47-42b4-80b7-0d1861e7fc09/export</link>
      <description>{"uuid": "0ed2034e-1e47-42b4-80b7-0d1861e7fc09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25580", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}</description>
      <content:encoded>{"uuid": "0ed2034e-1e47-42b4-80b7-0d1861e7fc09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25580", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/0ed2034e-1e47-42b4-80b7-0d1861e7fc09/export</guid>
      <pubDate>Tue, 12 Aug 2025 13:33:28 +0000</pubDate>
    </item>
    <item>
      <title>f8d93fe8-f495-4382-a012-e95610eda06e</title>
      <link>https://db.gcve.eu/sighting/f8d93fe8-f495-4382-a012-e95610eda06e/export</link>
      <description>{"uuid": "f8d93fe8-f495-4382-a012-e95610eda06e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25580", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:28.000000Z"}</description>
      <content:encoded>{"uuid": "f8d93fe8-f495-4382-a012-e95610eda06e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-25580", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f8d93fe8-f495-4382-a012-e95610eda06e/export</guid>
      <pubDate>Thu, 21 Aug 2025 03:19:28 +0000</pubDate>
    </item>
    <item>
      <title>a40806d4-3b69-41df-81fc-d4254eebf526</title>
      <link>https://db.gcve.eu/sighting/a40806d4-3b69-41df-81fc-d4254eebf526/export</link>
      <description>{"uuid": "a40806d4-3b69-41df-81fc-d4254eebf526", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-2558", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-2558.yaml", "content": "", "creation_timestamp": "2026-04-09T02:52:43.000000Z"}</description>
      <content:encoded>{"uuid": "a40806d4-3b69-41df-81fc-d4254eebf526", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-2558", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2025/CVE-2025-2558.yaml", "content": "", "creation_timestamp": "2026-04-09T02:52:43.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/a40806d4-3b69-41df-81fc-d4254eebf526/export</guid>
      <pubDate>Thu, 09 Apr 2026 02:52:43 +0000</pubDate>
    </item>
    <item>
      <title>077618ab-fe7f-42b2-8f5e-5cf3b1eff199</title>
      <link>https://db.gcve.eu/sighting/077618ab-fe7f-42b2-8f5e-5cf3b1eff199/export</link>
      <description>{"uuid": "077618ab-fe7f-42b2-8f5e-5cf3b1eff199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-2558", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mj67us6sjt2o", "content": "", "creation_timestamp": "2026-04-10T21:03:09.036017Z"}</description>
      <content:encoded>{"uuid": "077618ab-fe7f-42b2-8f5e-5cf3b1eff199", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2025-2558", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mj67us6sjt2o", "content": "", "creation_timestamp": "2026-04-10T21:03:09.036017Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/077618ab-fe7f-42b2-8f5e-5cf3b1eff199/export</guid>
      <pubDate>Fri, 10 Apr 2026 21:03:09 +0000</pubDate>
    </item>
  </channel>
</rss>
