<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 23:40:36 +0000</lastBuildDate>
    <item>
      <title>8dcd9377-ab38-4d4e-b222-17f8ed2d017b</title>
      <link>https://db.gcve.eu/sighting/8dcd9377-ab38-4d4e-b222-17f8ed2d017b/export</link>
      <description>{"uuid": "8dcd9377-ab38-4d4e-b222-17f8ed2d017b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31885", "type": "seen", "source": "https://t.me/cvedetector/21760", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31885 - Improper Neutralization of Input During Web Page G\", \n  \"Content\": \"CVE ID : CVE-2025-31885 \nPublished : April 1, 2025, 3:16 p.m. | 14\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Daniel Floeter Hyperlink Group Block allows DOM-Based XSS. This issue affects Hyperlink Group Block: from n/a through 2.0.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T18:03:39.000000Z"}</description>
      <content:encoded>{"uuid": "8dcd9377-ab38-4d4e-b222-17f8ed2d017b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31885", "type": "seen", "source": "https://t.me/cvedetector/21760", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31885 - Improper Neutralization of Input During Web Page G\", \n  \"Content\": \"CVE ID : CVE-2025-31885 \nPublished : April 1, 2025, 3:16 p.m. | 14\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Daniel Floeter Hyperlink Group Block allows DOM-Based XSS. This issue affects Hyperlink Group Block: from n/a through 2.0.1. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T18:03:39.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8dcd9377-ab38-4d4e-b222-17f8ed2d017b/export</guid>
      <pubDate>Tue, 01 Apr 2025 18:03:39 +0000</pubDate>
    </item>
    <item>
      <title>6c816b65-e96b-484f-ad28-ade74f56f121</title>
      <link>https://db.gcve.eu/sighting/6c816b65-e96b-484f-ad28-ade74f56f121/export</link>
      <description>{"uuid": "6c816b65-e96b-484f-ad28-ade74f56f121", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31886", "type": "seen", "source": "https://t.me/cvedetector/21761", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31886 - Missing Authorization vulnerability in Repuso Soci\", \n  \"Content\": \"CVE ID : CVE-2025-31886 \nPublished : April 1, 2025, 3:16 p.m. | 14\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Repuso Social proof testimonials and reviews by Repuso allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Social proof testimonials and reviews by Repuso: from n/a through 5.21. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T18:03:40.000000Z"}</description>
      <content:encoded>{"uuid": "6c816b65-e96b-484f-ad28-ade74f56f121", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31886", "type": "seen", "source": "https://t.me/cvedetector/21761", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31886 - Missing Authorization vulnerability in Repuso Soci\", \n  \"Content\": \"CVE ID : CVE-2025-31886 \nPublished : April 1, 2025, 3:16 p.m. | 14\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Repuso Social proof testimonials and reviews by Repuso allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Social proof testimonials and reviews by Repuso: from n/a through 5.21. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T18:03:40.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/6c816b65-e96b-484f-ad28-ade74f56f121/export</guid>
      <pubDate>Tue, 01 Apr 2025 18:03:40 +0000</pubDate>
    </item>
    <item>
      <title>d2919a81-0b4a-4932-a254-214ec75fd3e7</title>
      <link>https://db.gcve.eu/sighting/d2919a81-0b4a-4932-a254-214ec75fd3e7/export</link>
      <description>{"uuid": "d2919a81-0b4a-4932-a254-214ec75fd3e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31887", "type": "seen", "source": "https://t.me/cvedetector/21762", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31887 - Missing Authorization vulnerability in zookatron M\", \n  \"Content\": \"CVE ID : CVE-2025-31887 \nPublished : April 1, 2025, 3:16 p.m. | 14\u00a0minutes ago \nDescription : Missing Authorization vulnerability in zookatron MyBookProgress by Stormhill Media allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MyBookProgress by Stormhill Media: from n/a through 1.0.8. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T18:03:41.000000Z"}</description>
      <content:encoded>{"uuid": "d2919a81-0b4a-4932-a254-214ec75fd3e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31887", "type": "seen", "source": "https://t.me/cvedetector/21762", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31887 - Missing Authorization vulnerability in zookatron M\", \n  \"Content\": \"CVE ID : CVE-2025-31887 \nPublished : April 1, 2025, 3:16 p.m. | 14\u00a0minutes ago \nDescription : Missing Authorization vulnerability in zookatron MyBookProgress by Stormhill Media allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MyBookProgress by Stormhill Media: from n/a through 1.0.8. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T18:03:41.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/d2919a81-0b4a-4932-a254-214ec75fd3e7/export</guid>
      <pubDate>Tue, 01 Apr 2025 18:03:41 +0000</pubDate>
    </item>
    <item>
      <title>01d8eb57-573d-4afa-80e5-179318653e82</title>
      <link>https://db.gcve.eu/sighting/01d8eb57-573d-4afa-80e5-179318653e82/export</link>
      <description>{"uuid": "01d8eb57-573d-4afa-80e5-179318653e82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31888", "type": "seen", "source": "https://t.me/cvedetector/21763", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31888 - Cross-Site Request Forgery (CSRF) vulnerability in\", \n  \"Content\": \"CVE ID : CVE-2025-31888 \nPublished : April 1, 2025, 3:16 p.m. | 14\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in WPExperts.io WP Multistore Locator allows Cross Site Request Forgery. This issue affects WP Multistore Locator: from n/a through 2.5.2. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T18:03:42.000000Z"}</description>
      <content:encoded>{"uuid": "01d8eb57-573d-4afa-80e5-179318653e82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31888", "type": "seen", "source": "https://t.me/cvedetector/21763", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31888 - Cross-Site Request Forgery (CSRF) vulnerability in\", \n  \"Content\": \"CVE ID : CVE-2025-31888 \nPublished : April 1, 2025, 3:16 p.m. | 14\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in WPExperts.io WP Multistore Locator allows Cross Site Request Forgery. This issue affects WP Multistore Locator: from n/a through 2.5.2. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T18:03:42.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/01d8eb57-573d-4afa-80e5-179318653e82/export</guid>
      <pubDate>Tue, 01 Apr 2025 18:03:42 +0000</pubDate>
    </item>
    <item>
      <title>f8e4c6f5-551c-4417-bfb3-59ed415cb768</title>
      <link>https://db.gcve.eu/sighting/f8e4c6f5-551c-4417-bfb3-59ed415cb768/export</link>
      <description>{"uuid": "f8e4c6f5-551c-4417-bfb3-59ed415cb768", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31880", "type": "seen", "source": "https://t.me/cvedetector/21766", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31880 - Cross-Site Request Forgery (CSRF) vulnerability in\", \n  \"Content\": \"CVE ID : CVE-2025-31880 \nPublished : April 1, 2025, 3:16 p.m. | 14\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Stylemix Pearl allows Cross Site Request Forgery. This issue affects Pearl: from n/a through 1.3.9. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T18:03:47.000000Z"}</description>
      <content:encoded>{"uuid": "f8e4c6f5-551c-4417-bfb3-59ed415cb768", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31880", "type": "seen", "source": "https://t.me/cvedetector/21766", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31880 - Cross-Site Request Forgery (CSRF) vulnerability in\", \n  \"Content\": \"CVE ID : CVE-2025-31880 \nPublished : April 1, 2025, 3:16 p.m. | 14\u00a0minutes ago \nDescription : Cross-Site Request Forgery (CSRF) vulnerability in Stylemix Pearl allows Cross Site Request Forgery. This issue affects Pearl: from n/a through 1.3.9. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T18:03:47.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/f8e4c6f5-551c-4417-bfb3-59ed415cb768/export</guid>
      <pubDate>Tue, 01 Apr 2025 18:03:47 +0000</pubDate>
    </item>
    <item>
      <title>ff938b5d-a53d-4b1c-89ca-391b3e28ad1a</title>
      <link>https://db.gcve.eu/sighting/ff938b5d-a53d-4b1c-89ca-391b3e28ad1a/export</link>
      <description>{"uuid": "ff938b5d-a53d-4b1c-89ca-391b3e28ad1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31881", "type": "seen", "source": "https://t.me/cvedetector/21767", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31881 - Missing Authorization vulnerability in Stylemix Pe\", \n  \"Content\": \"CVE ID : CVE-2025-31881 \nPublished : April 1, 2025, 3:16 p.m. | 14\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Stylemix Pearl allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Pearl: from n/a through 1.3.9. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T18:03:48.000000Z"}</description>
      <content:encoded>{"uuid": "ff938b5d-a53d-4b1c-89ca-391b3e28ad1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31881", "type": "seen", "source": "https://t.me/cvedetector/21767", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31881 - Missing Authorization vulnerability in Stylemix Pe\", \n  \"Content\": \"CVE ID : CVE-2025-31881 \nPublished : April 1, 2025, 3:16 p.m. | 14\u00a0minutes ago \nDescription : Missing Authorization vulnerability in Stylemix Pearl allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Pearl: from n/a through 1.3.9. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T18:03:48.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/ff938b5d-a53d-4b1c-89ca-391b3e28ad1a/export</guid>
      <pubDate>Tue, 01 Apr 2025 18:03:48 +0000</pubDate>
    </item>
    <item>
      <title>5d5eb7ac-3250-447e-ad72-fb3ff482f2ad</title>
      <link>https://db.gcve.eu/sighting/5d5eb7ac-3250-447e-ad72-fb3ff482f2ad/export</link>
      <description>{"uuid": "5d5eb7ac-3250-447e-ad72-fb3ff482f2ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31882", "type": "seen", "source": "https://t.me/cvedetector/21768", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31882 - Missing Authorization vulnerability in WPWebinarSy\", \n  \"Content\": \"CVE ID : CVE-2025-31882 \nPublished : April 1, 2025, 3:16 p.m. | 14\u00a0minutes ago \nDescription : Missing Authorization vulnerability in WPWebinarSystem WebinarPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WebinarPress: from n/a through 1.33.27. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T18:03:49.000000Z"}</description>
      <content:encoded>{"uuid": "5d5eb7ac-3250-447e-ad72-fb3ff482f2ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31882", "type": "seen", "source": "https://t.me/cvedetector/21768", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31882 - Missing Authorization vulnerability in WPWebinarSy\", \n  \"Content\": \"CVE ID : CVE-2025-31882 \nPublished : April 1, 2025, 3:16 p.m. | 14\u00a0minutes ago \nDescription : Missing Authorization vulnerability in WPWebinarSystem WebinarPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WebinarPress: from n/a through 1.33.27. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T18:03:49.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5d5eb7ac-3250-447e-ad72-fb3ff482f2ad/export</guid>
      <pubDate>Tue, 01 Apr 2025 18:03:49 +0000</pubDate>
    </item>
    <item>
      <title>7c34497e-b44a-452f-b38b-1a4322e18a36</title>
      <link>https://db.gcve.eu/sighting/7c34497e-b44a-452f-b38b-1a4322e18a36/export</link>
      <description>{"uuid": "7c34497e-b44a-452f-b38b-1a4322e18a36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31889", "type": "seen", "source": "https://t.me/cvedetector/21805", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31889 - Elementor Extensions Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31889 \nPublished : April 1, 2025, 9:15 p.m. | 27\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in petesheppard84 Extensions for Elementor. This issue affects Extensions for Elementor: from n/a through 2.0.40. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T23:56:00.000000Z"}</description>
      <content:encoded>{"uuid": "7c34497e-b44a-452f-b38b-1a4322e18a36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31889", "type": "seen", "source": "https://t.me/cvedetector/21805", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31889 - Elementor Extensions Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-31889 \nPublished : April 1, 2025, 9:15 p.m. | 27\u00a0minutes ago \nDescription : Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in petesheppard84 Extensions for Elementor. This issue affects Extensions for Elementor: from n/a through 2.0.40. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-01T23:56:00.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/7c34497e-b44a-452f-b38b-1a4322e18a36/export</guid>
      <pubDate>Tue, 01 Apr 2025 23:56:00 +0000</pubDate>
    </item>
    <item>
      <title>e7eb53b8-daac-4fab-b259-1ed58332935c</title>
      <link>https://db.gcve.eu/sighting/e7eb53b8-daac-4fab-b259-1ed58332935c/export</link>
      <description>{"uuid": "e7eb53b8-daac-4fab-b259-1ed58332935c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3188", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10368", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3188\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical has been found in PHPGurukul e-Diary Management System 1.0. This affects an unknown part of the file /add-notes.php. The manipulation of the argument Category leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-04T00:31:05.692Z\n\ud83d\udccf Modified: 2025-04-04T00:31:05.692Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303147\n2. https://vuldb.com/?ctiid.303147\n3. https://vuldb.com/?submit.544110\n4. https://github.com/TiggerT/MyCVE/issues/2\n5. https://phpgurukul.com/", "creation_timestamp": "2025-04-04T00:35:08.000000Z"}</description>
      <content:encoded>{"uuid": "e7eb53b8-daac-4fab-b259-1ed58332935c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3188", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10368", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-3188\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability classified as critical has been found in PHPGurukul e-Diary Management System 1.0. This affects an unknown part of the file /add-notes.php. The manipulation of the argument Category leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\n\ud83d\udccf Published: 2025-04-04T00:31:05.692Z\n\ud83d\udccf Modified: 2025-04-04T00:31:05.692Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.303147\n2. https://vuldb.com/?ctiid.303147\n3. https://vuldb.com/?submit.544110\n4. https://github.com/TiggerT/MyCVE/issues/2\n5. https://phpgurukul.com/", "creation_timestamp": "2025-04-04T00:35:08.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e7eb53b8-daac-4fab-b259-1ed58332935c/export</guid>
      <pubDate>Fri, 04 Apr 2025 00:35:08 +0000</pubDate>
    </item>
    <item>
      <title>8ebf3547-b8a2-4c6c-8791-83d97ff73987</title>
      <link>https://db.gcve.eu/sighting/8ebf3547-b8a2-4c6c-8791-83d97ff73987/export</link>
      <description>{"uuid": "8ebf3547-b8a2-4c6c-8791-83d97ff73987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3188", "type": "seen", "source": "https://t.me/cvedetector/22052", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3188 - PHPGurukul e-Diary Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-3188 \nPublished : April 4, 2025, 1:15 a.m. | 19\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in PHPGurukul e-Diary Management System 1.0. This affects an unknown part of the file /add-notes.php. The manipulation of the argument Category leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T03:47:33.000000Z"}</description>
      <content:encoded>{"uuid": "8ebf3547-b8a2-4c6c-8791-83d97ff73987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3188", "type": "seen", "source": "https://t.me/cvedetector/22052", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3188 - PHPGurukul e-Diary Management System SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2025-3188 \nPublished : April 4, 2025, 1:15 a.m. | 19\u00a0minutes ago \nDescription : A vulnerability classified as critical has been found in PHPGurukul e-Diary Management System 1.0. This affects an unknown part of the file /add-notes.php. The manipulation of the argument Category leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-04T03:47:33.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8ebf3547-b8a2-4c6c-8791-83d97ff73987/export</guid>
      <pubDate>Fri, 04 Apr 2025 03:47:33 +0000</pubDate>
    </item>
  </channel>
</rss>
